1%%% ==================================================================== 2%%% BibTeX-file{ 3%%% author = "Nelson H. F. Beebe", 4%%% version = "2.09", 5%%% date = "26 March 1997", 6%%% time = "08:21:19 MST", 7%%% filename = "cacm1970.bib", 8%%% address = "Center for Scientific Computing 9%%% Department of Mathematics 10%%% University of Utah 11%%% Salt Lake City, UT 84112 12%%% USA", 13%%% telephone = "+1 801 581 5254", 14%%% FAX = "+1 801 581 4148", 15%%% checksum = "50673 40670 196033 1787829", 16%%% email = "beebe at math.utah.edu (Internet)", 17%%% codetable = "ISO/ASCII", 18%%% keywords = "bibliography, CACM, Communications of the 19%%% ACM", 20%%% supported = "yes", 21%%% docstring = "This is a bibliography of the journal 22%%% Communications of the ACM, covering 23%%% (incompletely) 1970 -- 1979. 24%%% 25%%% At version 2.09, the year coverage looked 26%%% like this: 27%%% 28%%% 1961 ( 1) 1972 (168) 1983 ( 0) 29%%% 1962 ( 1) 1973 (158) 1984 ( 0) 30%%% 1963 ( 2) 1974 (127) 1985 ( 2) 31%%% 1964 ( 2) 1975 (107) 1986 ( 0) 32%%% 1965 ( 1) 1976 ( 97) 1987 ( 0) 33%%% 1966 ( 2) 1977 (117) 1988 ( 0) 34%%% 1967 ( 1) 1978 (118) 1989 ( 0) 35%%% 1968 ( 1) 1979 ( 78) 1990 ( 2) 36%%% 1969 ( 3) 1980 ( 1) 1991 ( 4) 37%%% 1970 (157) 1981 ( 2) 1992 ( 1) 38%%% 1971 (104) 1982 ( 1) 39%%% 40%%% Article: 1252 41%%% Book: 2 42%%% InProceedings: 1 43%%% Manual: 1 44%%% MastersThesis: 1 45%%% PhdThesis: 1 46%%% 47%%% Total entries: 1258 48%%% 49%%% The size of the original cacm.bib file 50%%% covering 1958--1996 became too large (about 51%%% 4000 entries) for BibTeX and TeX to handle, 52%%% so at version 1.44, it was split into 53%%% cacm1950.bib, cacm1960.bib, cacm1970.bib, 54%%% cacm1980.bib, and cacm1990.bib, each covering 55%%% the decade starting with the year embedded in 56%%% the filename. Version numbers for these 57%%% files begin at 2.00. 58%%% 59%%% Volumes from the 1990s average more than 200 60%%% articles yearly, so a complete bibliography 61%%% for this journal could contain more than 6000 62%%% entries from 1958 to 2000. 63%%% 64%%% These bibliographies also include ACM 65%%% Algorithms 1--492. For Algorithms 493--686, 66%%% including Algorithm 568, published in ACM 67%%% Transactions on Programming Languages and 68%%% Systems (TOPLAS), see the companion 69%%% bibliographies, toms.bib and toplas.bib. 70%%% 71%%% All published Remarks and Corrigenda are 72%%% cross-referenced in both directions, so 73%%% that citing a paper will automatically 74%%% generate citations for those Remarks and 75%%% Corrigenda. Cross-referenced entries are 76%%% duplicated in cacm19*.bib and toms.bib, so 77%%% that each is completely self-contained. 78%%% 79%%% Source code for ACM Algorithms from 380 80%%% onwards, with some omissions, is available 81%%% via the Netlib service at 82%%% http://netlib.ornl.gov/, and 83%%% ftp://netlib.bell-labs.com/netlib/toms. 84%%% 85%%% There is a World Wide Web search facility 86%%% for articles published in this journal from 87%%% 1959 to 1979 at 88%%% http://ciir.cs.umass.edu/cgi-bin/web_query_form/public/cacm2.1. 89%%% 90%%% The initial draft of entries for 1981 -- 91%%% 1990 was extracted from the ACM Computing 92%%% Archive CD ROM for the 1980s, with manual 93%%% corrections and additions. Additions were 94%%% then made from all of the bibliographies in 95%%% the TeX User Group collection, from 96%%% bibliographies in the author's personal 97%%% files, from the Compendex database 98%%% (1970--1979), from the IEEE INSPEC database 99%%% (1970--1979), from tables of contents 100%%% information at http://www.acm.org/pubs/cacm/, 101%%% from Zentralblatt fur Mathematik Mathematics 102%%% Abstracts at 103%%% http://www.emis.de/cgi-bin/MATH/, from 104%%% bibliographies at Internet host 105%%% netlib.bell-labs.com, and from the computer 106%%% science bibliography collection on 107%%% ftp.ira.uka.de in /pub/bibliography to which 108%%% many people of have contributed. The 109%%% snapshot of this collection was taken on 110%%% 5-May-1994, and it consists of 441 BibTeX 111%%% files, 2,672,675 lines, 205,289 entries, and 112%%% 6,375 <at>String{} abbreviations, occupying 113%%% 94.8MB of disk space. 114%%% 115%%% Numerous errors in the sources noted above 116%%% have been corrected. Spelling has been 117%%% verified with the UNIX spell and GNU ispell 118%%% programs using the exception dictionary 119%%% stored in the companion file with extension 120%%% .sok. 121%%% 122%%% BibTeX citation tags are uniformly chosen 123%%% as name:year:abbrev, where name is the 124%%% family name of the first author or editor, 125%%% year is a 4-digit number, and abbrev is a 126%%% 3-letter condensation of important title 127%%% words. Citation tags were automatically 128%%% generated by software developed for the 129%%% BibNet Project. 130%%% 131%%% In this bibliography, entries are sorted in 132%%% publication order within each journal, 133%%% using bibsort -byvolume. 134%%% 135%%% The checksum field above contains a CRC-16 136%%% checksum as the first value, followed by the 137%%% equivalent of the standard UNIX wc (word 138%%% count) utility output of lines, words, and 139%%% characters. This is produced by Robert 140%%% Solovay's checksum utility.", 141%%% } 142%%% ==================================================================== 143 144@Preamble{"\input bibnames.sty " # "\input path.sty " # "\def \TM {${}^{\sc TM}$} " # "\hyphenation{ al-pha-mer-ic Balz-er Blom-quist Bo-ta-fo-go Bran-din Brans-comb Bu-tera Chris-tina Christ-o-fi-des Col-lins Cor-dell data-base econ-omies Fletch-er flow-chart flow-charts Fry-styk ge-dank-en Gar-fink-el Ge-ha-ni Glush-ko Goud-reau Gua-dan-go Hari-di Haw-thorn Hem-men-ding-er Hor-o-witz Hour-vitz Hirsch-berg Ike-da Ka-chi-tvi-chyan-u-kul Kat-ze-nel-son Kitz-miller Ko-ba-yashi Le-Me-tay-er Ken-ne-dy Law-rence Mac-kay Mai-net-ti Mar-sa-glia Max-well Mer-ner Mo-ran-di Na-ray-an New-ell Nich-ols para-digm pat-ent-ed Phi-lo-kyp-rou Prep-a-ra-ta pseu-do-chain-ing QUIK-SCRIPT Rad-e-mach-er re-eval-u-a-tion re-wind Ros-witha Scheu-er-mann Schwach-heim Schob-bens Schon-berg Sho-sha-ni Si-tha-ra-ma Skwa-rec-ki Streck-er Strin-gi-ni Tes-ler Te-zu-ka Teu-ho-la Till-quist Town-send Tsi-chri-tzis Tur-ski Vuille-min Wald-ing-er Za-bo-row-ski Za-mora }"} 145 146%======================================================================= 147% Acknowledgement abbreviations: 148 149@String{ack-nhfb = "Nelson H. F. Beebe, Center for Scientific Computing, Department of Mathematics, University of Utah, Salt Lake City, UT 84112, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|"} 150 151@String{ack-nj = "Norbert Juffa, 2445 Mission College Blvd. Santa Clara, CA 95054 USA email: \path=norbert@iit.com="} 152 153%======================================================================= 154% Journal abbreviations: 155 156@String{j-CACM = "Communications of the ACM"} 157 158@String{j-COMP-SURV = "Computing Surveys"} 159 160@String{j-J-ACM = "Journal of the ACM"} 161 162@String{j-MANAGEMENT-SCIENCE = "Management Science"} 163 164@String{j-SIAM-J-COMPUT = "SIAM Journal of Computing"} 165 166@String{j-SPE = "Software --- Practice and Experience"} 167 168@String{j-TOMS = "ACM Transactions on Mathematical Software"} 169 170%======================================================================= 171% Publisher abbreviations: 172 173@String{pub-ANSI = "American National Standards Institute"} 174 175@String{pub-ANSI:adr = "1430 Broadway, New York, NY 10018, USA"} 176 177@String{pub-AW = "Ad{\-d}i{\-s}on-Wes{\-l}ey"} 178 179@String{pub-AW:adr = "Reading, MA, USA"} 180 181@String{pub-SUCSLI = "Stanford University Center for the Study of Language and Information"} 182 183@String{pub-SUCSLI:adr = "Stanford, CA, USA"} 184 185@String{pub-SV = "Spring{\-}er-Ver{\-}lag"} 186 187@String{pub-SV:adr = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc."} 188 189%======================================================================= 190% Bibliography entries (cross-references in notes necessitate 191% inclusion of a few additional entries published elsewhere): 192 193@Article{Herndon:1961:AAS, 194 author = "J. R. Herndon", 195 title = "{ACM} Algorithm 49: Spherical {Neumann} Function", 196 journal = j-CACM, 197 volume = "4", 198 number = "4", 199 pages = "179", 200 month = apr, 201 year = "1961", 202 CODEN = "CACMA2", 203 ISSN = "0001-0782", 204 bibdate = "Thu Sep 08 09:47:50 1994", 205 note = "See also \cite{Coleman:1978:RAS}.", 206} 207 208@Article{Merner:1962:AAC, 209 author = "J. N. Merner", 210 title = "{ACM} Algorithm 149: Complete Elliptic Integral", 211 journal = j-CACM, 212 volume = "5", 213 number = "12", 214 pages = "605", 215 month = dec, 216 year = "1962", 217 CODEN = "CACMA2", 218 ISSN = "0001-0782", 219 bibdate = "Thu Sep 08 09:47:50 1994", 220 note = "See also \cite{Skovgaard:1978:RCE}.", 221} 222 223@Article{Ludwig:1963:AAI, 224 author = "O. G. Ludwig", 225 title = "{ACM} Algorithm 179: Incomplete Beta Ratio", 226 journal = j-CACM, 227 volume = "6", 228 number = "6", 229 pages = "314", 230 month = jun, 231 year = "1963", 232 CODEN = "CACMA2", 233 ISSN = "0001-0782", 234 bibdate = "Thu Sep 08 09:47:50 1994", 235 note = "See also \cite{Pike:1976:RIB}.", 236} 237 238@Article{Kase:1963:AAT, 239 author = "R. H. Kase", 240 title = "{ACM} Algorithm 219: Topological Ordering for {Pert} Networks", 241 journal = j-CACM, 242 volume = "6", 243 number = "12", 244 pages = "738--739", 245 month = dec, 246 year = "1963", 247 CODEN = "CACMA2", 248 ISSN = "0001-0782", 249 bibdate = "Thu Sep 08 09:47:51 1994", 250 note = "See also \cite{Tenney:1977:RAT}.", 251} 252 253@Article{Gautschi:1964:AAB, 254 author = "W. Gautschi", 255 title = "{ACM} Algorithm 236: {Bessel} Functions of the First Kind", 256 journal = j-CACM, 257 volume = "7", 258 number = "8", 259 pages = "479--480", 260 month = aug, 261 year = "1964", 262 CODEN = "CACMA2", 263 ISSN = "0001-0782", 264 bibdate = "Thu Sep 08 09:47:54 1994", 265 note = "See also \cite{Skovgaard:1975:RBF}.", 266} 267 268@Article{Boothroyd:1964:AAG, 269 author = "J. Boothroyd", 270 title = "{ACM} Algorithm 246: Graycode", 271 journal = j-CACM, 272 volume = "7", 273 number = "12", 274 pages = "701", 275 month = dec, 276 year = "1964", 277 CODEN = "CACMA2", 278 ISSN = "0001-0782", 279 bibdate = "Thu Sep 08 09:47:54 1994", 280 note = "See also \cite{Misra:1975:RG,Er:1985:RG}.", 281} 282 283@Article{Gautschi:1965:AAL, 284 author = "W. Gautschi", 285 title = "{ACM} Algorithm 259: {Legendre} Functions for Arguments Larger than One", 286 journal = j-CACM, 287 volume = "8", 288 number = "8", 289 pages = "488--492", 290 month = aug, 291 year = "1965", 292 CODEN = "CACMA2", 293 ISSN = "0001-0782", 294 bibdate = "Thu Sep 08 09:47:54 1994", 295 note = "See also \cite{Jansen:1977:RLF}.", 296} 297 298@Article{Fletcher:1966:AAI, 299 author = "W. Fletcher", 300 title = "{ACM} Algorithm 284: Interchange of Two Blocks of Data", 301 journal = j-CACM, 302 volume = "9", 303 number = "5", 304 pages = "326", 305 month = may, 306 year = "1966", 307 CODEN = "CACMA2", 308 ISSN = "0001-0782", 309 bibdate = "Thu Sep 08 09:47:54 1994", 310 note = "See also \cite{Ito:1976:RIT}.", 311} 312 313@Article{Hill:1967:AAC, 314 author = "I. D. Hill and M. C. Pike", 315 title = "{ACM} Algorithm 299: Chi-Squared Integral", 316 journal = j-CACM, 317 volume = "10", 318 number = "4", 319 pages = "243--244", 320 month = apr, 321 year = "1967", 322 CODEN = "CACMA2", 323 ISSN = "0001-0782", 324 bibdate = "Thu Sep 08 09:47:54 1994", 325 note = "See also \cite{Lozy:1976:RCS,Hill:1985:RCS}.", 326} 327 328@Article{Dijkstra:1968:GSC, 329 author = "Edsger Wybe Dijkstra", 330 title = "Go to statement considered harmful", 331 journal = j-CACM, 332 volume = "11", 333 number = "3", 334 pages = "147--148", 335 month = mar, 336 year = "1968", 337 CODEN = "CACMA2", 338 ISSN = "0001-0782", 339 note = "This paper inspired scores of others, published mainly in SIGPLAN Notices up to the mid-1980s. The best-known is \cite{Knuth:1974:SPG}.", 340} 341 342@Article{ANSI:1969:CFS, 343 author = "{ANSI Subcommittee X3J3}", 344 title = "Clarification of {Fortran} Standards --- Initial Progress", 345 journal = j-CACM, 346 volume = "12", 347 number = "5", 348 pages = "289--294", 349 month = may, 350 year = "1969", 351 CODEN = "CACMA2", 352 ISSN = "0001-0782", 353 bibdate = "Mon Aug 29 18:26:25 1994", 354 note = "See also \cite{ANSI:1966:AF}.", 355 acknowledgement = ack-nhfb, 356} 357 358@Article{Wirth:1969:MMC, 359 author = "N. Wirth", 360 title = "On Multiprogramming, Machine Coding, and Computer Organization", 361 journal = j-CACM, 362 volume = "12", 363 number = "9", 364 pages = "489--498", 365 month = sep, 366 year = "1969", 367 CODEN = "CACMA2", 368 ISSN = "0001-0782", 369 bibdate = "Fri Jan 17 18:23:22 1997", 370 note = "See corrigendum \cite{Wirth:1970:CMM}.", 371} 372 373@Article{Lum:1970:MAR, 374 author = "V. Y. Lum", 375 title = "Multi-Attribute Retrieval with Combined Indexes", 376 journal = j-CACM, 377 volume = "1", 378 number = "11", 379 pages = "660--665", 380 month = nov, 381 year = "1970", 382 CODEN = "CACMA2", 383 ISSN = "0001-0782", 384 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 385 annote = "Construction of combined indexes with formulas for number needed.", 386} 387 388@Article{Lowe:1970:ASC, 389 author = "T. C. Lowe", 390 title = "Automatic segmentation of cyclic program structures based on connectivity and processor timing", 391 journal = j-CACM, 392 volume = "13", 393 number = "1", 394 pages = "3--6", 395 month = jan, 396 year = "1970", 397 CODEN = "CACMA2", 398 ISSN = "0001-0782", 399 bibdate = "Tue Mar 25 13:26:09 MST 1997", 400 acknowledgement = ack-nhfb, 401 classcodes = "C6150C (Compilers, interpreters and other processors)", 402 corpsource = "Informatics Inc., Bethesda, MD, USA", 403 keywords = "input-output programs; multiprogramming; program processors; time-sharing programs", 404} 405 406@Article{Gautschi:1970:RCC, 407 author = "Walter Gautschi and Bruce J. Klein", 408 title = "Recursive computation of certain derivatives --- {A} study of error propagation", 409 journal = j-CACM, 410 volume = "13", 411 number = "1", 412 pages = "7--9", 413 month = jan, 414 year = "1970", 415 CODEN = "CACMA2", 416 ISSN = "0001-0782", 417 MRclass = "65Q05", 418 MRnumber = "46 1115", 419 mrreviewer = "D. F. Mayers", 420 bibdate = "Tue Mar 25 13:26:09 MST 1997", 421 abstract = "A brief study is made of the propagation of errors in linear first-order difference equations. The recursive computation of successive derivatives of $(e^x)/x$ and $(\cos x)/x$ is considered as an illustration.", 422 acknowledgement = ack-nhfb, 423 classcodes = "C4110 (Error analysis in numerical methods)", 424 corpsource = "Purdue Univ., Lafayette, IN, USA", 425 keywords = "difference equations; error analysis; error propagation; recursive computation; successive derivatives", 426} 427 428@Article{Mullery:1970:PAM, 429 author = "A. P. Mullery and G. C. Driscoll", 430 title = "A processor allocation method for time-sharing", 431 journal = j-CACM, 432 volume = "13", 433 number = "1", 434 pages = "10--14", 435 month = jan, 436 year = "1970", 437 CODEN = "CACMA2", 438 ISSN = "0001-0782", 439 bibdate = "Tue Mar 25 13:26:09 MST 1997", 440 acknowledgement = ack-nhfb, 441 classcodes = "C6150J (Operating systems)", 442 corpsource = "IBM, Thomas J. Watson Res. Center Yorktown Heights, NY, USA", 443 keywords = "storage allocation; time-sharing programs", 444} 445 446@Article{Simmons:1970:NLQ, 447 author = "R. F. Simmons", 448 title = "Natural Language Question-Answering Systems: 1969", 449 journal = j-CACM, 450 volume = "13", 451 number = "1", 452 pages = "15--30", 453 month = jan, 454 year = "1970", 455 CODEN = "CACMA2", 456 ISSN = "0001-0782", 457 bibdate = "Tue Mar 25 13:26:09 MST 1997", 458 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 459 acknowledgement = ack-nhfb, 460 classcodes = "C7820 (Humanities computing)", 461 corpsource = "Univ. Texas, Austin, TX, USA", 462 keywords = "artificial intelligence; computational linguistics; language; translation and linguistics", 463} 464 465@Article{Irons:1970:EEL, 466 author = "E. T. Irons", 467 title = "Experience with an extensible language", 468 journal = j-CACM, 469 volume = "13", 470 number = "1", 471 pages = "31--40", 472 month = jan, 473 year = "1970", 474 CODEN = "CACMA2", 475 ISSN = "0001-0782", 476 bibdate = "Tue Mar 25 13:26:09 MST 1997", 477 acknowledgement = ack-nhfb, 478 classcodes = "C6140D (High level languages)", 479 corpsource = "Inst. Defense Analyses Princeton, NJ, USA", 480 keywords = "procedure oriented languages", 481} 482 483@Article{Montanari:1970:NML, 484 author = "U. Montanari", 485 title = "A note on minimal length polygonal approximation to a digitized contour", 486 journal = j-CACM, 487 volume = "13", 488 number = "1", 489 pages = "41--47", 490 month = jan, 491 year = "1970", 492 CODEN = "CACMA2", 493 ISSN = "0001-0782", 494 MRclass = "65.20", 495 MRnumber = "44\#2311", 496 bibdate = "Tue Mar 25 13:26:09 MST 1997", 497 abstract = "A method for extracting a smooth polygonal contour from a digitized image is illustrated. The ordered sequence of contour points and the connection graph of the image are first obtained by a modified Ledley algorithm in one image scan. A minimal perimeter polygon subjected to specified constraints is then chosen as the approximating contour. The determination of the minimal polygon can be reduced to a nonlinear programming problem, solved by an algorithm which takes into account the weak bonds between variables. Some examples are presented, and the corresponding computing times are listed.", 498 acknowledgement = ack-nhfb, 499 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 500 corpsource = "Consiglio Nazionale delle Richerche, Pisa, Italy", 501 keywords = "connection tree; digitized image; minimal polygon; nonlinear programming; optimal approximation; pattern recognition", 502} 503 504@Article{Stehfest:1970:AAN, 505 author = "Harald Stehfest", 506 title = "{ACM} Algorithm 368: Numerical Inversion of {Laplace} Transforms", 507 journal = j-CACM, 508 volume = "13", 509 number = "1", 510 pages = "47--49", 511 month = jan, 512 year = "1970", 513 CODEN = "CACMA2", 514 ISSN = "0001-0782", 515 bibdate = "Tue Mar 25 13:26:09 MST 1997", 516 acknowledgement = ack-nhfb, 517 classcodes = "C7300 (Natural sciences computing)", 518 corpsource = "J. W. Goethe Univ. Frankfurt am Main, West Germany", 519 keywords = "Laplace transforms; subroutines", 520} 521 522@Article{Schaffer:1970:AAG, 523 author = "H. E. Schaffer", 524 title = "{ACM} Algorithm 369: Generator of Random Numbers Satisfying the {Poisson} Distribution", 525 journal = j-CACM, 526 volume = "13", 527 number = "1", 528 pages = "49--49", 529 month = jan, 530 year = "1970", 531 CODEN = "CACMA2", 532 ISSN = "0001-0782", 533 bibdate = "Tue Mar 25 13:26:09 MST 1997", 534 acknowledgement = ack-nhfb, 535 classcodes = "C7890 (Other special applications of computing)", 536 corpsource = "North Carolina State Univ., Raleigh, NC, USA", 537 keywords = "random number generation; subroutines", 538} 539 540@Article{Butler:1970:AAG, 541 author = "E. L. Butler", 542 title = "{ACM} Algorithm 370: General Random Number Generator", 543 journal = j-CACM, 544 volume = "13", 545 number = "1", 546 pages = "49--52", 547 month = jan, 548 year = "1970", 549 CODEN = "CACMA2", 550 ISSN = "0001-0782", 551 bibdate = "Tue Mar 25 13:26:09 MST 1997", 552 acknowledgement = ack-nhfb, 553 classcodes = "C7890 (Other special applications of computing)", 554 corpsource = "Texas A and M Univ., College Station, TX, USA", 555 keywords = "random number generation; subroutines", 556} 557 558@Article{McKay:1970:AAP, 559 author = "J. K. S. McKay", 560 title = "{ACM} Algorithm 371: Partitions in Natural Order", 561 journal = j-CACM, 562 volume = "13", 563 number = "1", 564 pages = "52--52", 565 month = jan, 566 year = "1970", 567 CODEN = "CACMA2", 568 ISSN = "0001-0782", 569 bibdate = "Tue Mar 25 13:26:09 MST 1997", 570 acknowledgement = ack-nhfb, 571 classcodes = "C7300 (Natural sciences computing)", 572 corpsource = "California Inst. Technol. Pasadena, CA, USA", 573 keywords = "number theory; subroutines", 574} 575 576@Article{Dunham:1970:AAA, 577 author = "K. B. Dunham", 578 title = "{ACM} Algorithm 372: An Algorithm to Produce Complex Primes {CSIEVE}", 579 journal = j-CACM, 580 volume = "13", 581 number = "1", 582 pages = "52--54", 583 month = jan, 584 year = "1970", 585 CODEN = "CACMA2", 586 ISSN = "0001-0782", 587 bibdate = "Tue Mar 25 13:26:09 MST 1997", 588 acknowledgement = ack-nhfb, 589 classcodes = "C7300 (Natural sciences computing)", 590 corpsource = "Georgia Inst. Technol., Atlanta, GA, USA", 591 keywords = "number theory; subroutines", 592} 593 594@Article{Griffin:1970:RME, 595 author = "R. Griffin and K. A. Redich", 596 title = "Remark on {``Algorithm 347 [{M1}]: An Efficient Algorithm for Sorting with Minimal Storage'', by R. C. Singleton}", 597 journal = j-CACM, 598 volume = "13", 599 number = "1", 600 pages = "54--54", 601 month = jan, 602 year = "1970", 603 CODEN = "CACMA2", 604 ISSN = "0001-0782", 605 bibdate = "Fri Jan 17 18:26:41 1997", 606 keywords = "digital computer sorting; minimal storage sorting; sorting", 607} 608 609@Article{Anonymous:1970:RCD, 610 author = "Anonymous", 611 title = "Representation for calendar date for machine-to-machine data interchange", 612 journal = j-CACM, 613 volume = "13", 614 number = "1", 615 pages = "55--55", 616 month = jan, 617 year = "1970", 618 CODEN = "CACMA2", 619 ISSN = "0001-0782", 620 bibdate = "Tue Mar 25 13:26:09 MST 1997", 621 acknowledgement = ack-nhfb, 622 classcodes = "C6130 (Data handling techniques)", 623 keywords = "codes; standards", 624} 625 626@Article{Anonymous:1970:IRP, 627 author = "Anonymous", 628 title = "Interchange rolls of perforated tape for information interchange", 629 journal = j-CACM, 630 volume = "13", 631 number = "1", 632 pages = "56--56", 633 month = jan, 634 year = "1970", 635 CODEN = "CACMA2", 636 ISSN = "0001-0782", 637 bibdate = "Tue Mar 25 13:26:09 MST 1997", 638 acknowledgement = ack-nhfb, 639 classcodes = "C5320Z (Other digital storage); C5560 (Data preparation equipment); C7250 (Information storage and retrieval)", 640 keywords = "digital storage; equipment; information retrieval; punched tape; standards", 641} 642 643@Article{Payne:1970:FTP, 644 author = "W. H. Payne", 645 title = "{Fortran Tausworthe} pseudorandom number generator", 646 journal = j-CACM, 647 volume = "13", 648 number = "1", 649 pages = "57--57", 650 month = jan, 651 year = "1970", 652 CODEN = "CACMA2", 653 ISSN = "0001-0782", 654 bibdate = "Tue Mar 25 13:26:09 MST 1997", 655 acknowledgement = ack-nhfb, 656 classcodes = "C7890 (Other special applications of computing)", 657 corpsource = "Washington State Univ. Pullman, WA, USA", 658 keywords = "random number generation", 659} 660 661@Article{Hsiao:1970:FSI, 662 author = "David K. Hsiao and Frank D. Harary", 663 title = "A Formal System for Information Retrieval from Files", 664 journal = j-CACM, 665 volume = "13", 666 number = "2", 667 pages = "67--73", 668 month = feb, 669 year = "1970", 670 CODEN = "CACMA2", 671 ISSN = "0001-0782", 672 bibdate = "Tue Mar 25 13:26:09 MST 1997", 673 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 674 note = "See corrigenda \cite{Hsiao:1970:CFS}.", 675 acknowledgement = ack-nhfb, 676 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 677 corpsource = "Univ. Pennsylvania, Philadelphia, PA, USA", 678 keywords = "file organisation; information retrieval", 679} 680 681@Article{vonGlaserfeld:1970:MPH, 682 author = "E. {von Glaserfeld} and P. P. Pisani", 683 title = "The multistore parser for hierarchical syntactic structures", 684 journal = j-CACM, 685 volume = "13", 686 number = "2", 687 pages = "74--82", 688 month = feb, 689 year = "1970", 690 CODEN = "CACMA2", 691 ISSN = "0001-0782", 692 bibdate = "Tue Mar 25 13:26:09 MST 1997", 693 acknowledgement = ack-nhfb, 694 classcodes = "C4210 (Formal logic)", 695 corpsource = "Univ. Georgia, Athens, GA, USA", 696 keywords = "computational linguistics", 697} 698 699@Article{Vere:1970:TE, 700 author = "Steven Vere", 701 title = "Translation equations", 702 journal = j-CACM, 703 volume = "13", 704 number = "2", 705 pages = "83--89", 706 month = feb, 707 year = "1970", 708 CODEN = "CACMA2", 709 ISSN = "0001-0782", 710 MRclass = "68A30", 711 MRnumber = "45 4925", 712 mrreviewer = "H. Maurer", 713 bibdate = "Tue Mar 25 13:26:09 MST 1997", 714 note = "See errata \cite{Vere:1970:TEE},", 715 abstract = "Input limited transduction expressions, or translation equations, are used to describe the syntax and left-context sensitive semantics for context-free languages. A formal procedure is given for deriving from a set of translation equations the specifications for a pushdown translator. The translator consists of Mealy form finite-state automata interacting by means of a pushdown stack. Within the framework described string recognition and parsing may be treated as special cases of the translation problem.", 716 acknowledgement = ack-nhfb, 717 classcodes = "C4210 (Formal logic)", 718 corpsource = "Univ. California, Los Angeles, CA, USA", 719 keywords = "automata; computational linguistics; context-free languages; finite state automata; formal languages; meta-compilers; parsing; pushdown transducer; recognizers; regular expression; syntax directed compilers; transduction expression; translation; Turing machines", 720} 721 722@Article{Morgan:1970:SCSa, 723 author = "H. L. Morgan", 724 title = "Spelling correction in systems programs", 725 journal = j-CACM, 726 volume = "13", 727 number = "2", 728 pages = "90--94", 729 month = feb, 730 year = "1970", 731 CODEN = "CACMA2", 732 ISSN = "0001-0782", 733 bibdate = "Tue Mar 25 13:26:09 MST 1997", 734 acknowledgement = ack-nhfb, 735 classcodes = "C6150G (Diagnostic, testing, debugging and evaluating systems)", 736 corpsource = "Cornell Univ., Ithaca, NY, USA", 737 keywords = "program debugging; subroutines", 738 xxnote = "Check issue number: 2 or 3??", 739} 740 741@Article{Earley:1970:ECF, 742 author = "J. Earley", 743 title = "An Efficient Context-Free Parsing Algorithm", 744 journal = j-CACM, 745 volume = "13", 746 number = "2", 747 pages = "94--102", 748 month = feb, 749 year = "1970", 750 CODEN = "CACMA2", 751 ISSN = "0001-0782", 752 bibdate = "Tue Mar 25 13:26:09 MST 1997", 753 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 754 abstract = "A parsing algorithm which seems to be the most efficient general context-free algorithm known is described. It is similar to both Knuth's LR(k) algorithm and the familiar top-down algorithm. It has a time bound proportional to $n^3$ (where $n$ is the length of the string being parsed) in general; it has a $n^2$ bound for unambiguous grammars; and it runs in linear time on a large class of grammars, which seems to include most practical context-free programming language grammars. In an empirical comparison it appears to be superior to the top-down and bottom-up algorithms studied by Griffiths and Petrick.", 755 acknowledgement = ack-nhfb, 756 classcodes = "C4210 (Formal logic); C6150C (Compilers, interpreters and other processors)", 757 corpsource = "Univ. California, Berkeley, CA, USA", 758 keywords = "compilers; computational complexity; context-free grammar; parsing; syntax analysis", 759 keywords = "computational linguistics; program compilers", 760} 761 762@Article{Radke:1970:UQR, 763 author = "C. E. Radke", 764 title = "The Use of Quadratic Residue Research", 765 journal = j-CACM, 766 volume = "13", 767 number = "2", 768 pages = "103--105", 769 month = feb, 770 year = "1970", 771 CODEN = "CACMA2", 772 ISSN = "0001-0782", 773 bibdate = "Tue Mar 25 13:26:09 MST 1997", 774 acknowledgement = ack-nhfb, 775 classcodes = "C6130 (Data handling techniques)", 776 corpsource = "IBM, Endicott, NY, USA", 777 keywords = "data handling; programming", 778} 779 780@Article{Jones:1970:VSA, 781 author = "B. Jones", 782 title = "A Variation on Sorting by Address Calculation", 783 journal = j-CACM, 784 volume = "13", 785 number = "2", 786 pages = "105--107", 787 month = feb, 788 year = "1970", 789 CODEN = "CACMA2", 790 ISSN = "0001-0782", 791 bibdate = "Tue Mar 25 13:26:09 MST 1997", 792 acknowledgement = ack-nhfb, 793 classcodes = "C6130 (Data handling techniques)", 794 corpsource = "Martin Marietta Corp., Orlando, FL, USA", 795 keywords = "sorting", 796} 797 798@Article{Bell:1970:QQM, 799 author = "James R. Bell", 800 title = "The Quadratic Quotient Method: {A} Hash Code Eliminating Secondary Clustering", 801 journal = j-CACM, 802 volume = "13", 803 number = "2", 804 pages = "107--109", 805 month = feb, 806 year = "1970", 807 CODEN = "CACMA2", 808 ISSN = "0001-0782", 809 bibdate = "Tue Mar 25 13:26:09 MST 1997", 810 acknowledgement = ack-nhfb, 811 classcodes = "C6130 (Data handling techniques)", 812 corpsource = "Digital Equipment Corp., Maynard, MA, USA", 813 keywords = "table lookup", 814} 815 816@Article{Ness:1970:CEG, 817 author = "D. N. Ness and R. S. Green and W. A. Martin and G. A. Moulton", 818 title = "Computer education in a graduate school of management", 819 journal = j-CACM, 820 volume = "13", 821 number = "2", 822 pages = "110--114, 19", 823 month = feb, 824 year = "1970", 825 CODEN = "CACMA2", 826 ISSN = "0001-0782", 827 bibdate = "Tue Mar 25 13:26:09 MST 1997", 828 acknowledgement = ack-nhfb, 829 classcodes = "C0220 (Computing education and training)", 830 corpsource = "M.I.T., Cambridge, MA, USA", 831 keywords = "education; management; simulation", 832} 833 834@Article{Robbins:1970:ICS, 835 author = "M. F. Robbins and J. D. Beyer", 836 title = "An interactive computer system using graphical flowchart input", 837 journal = j-CACM, 838 volume = "13", 839 number = "2", 840 pages = "115--119", 841 month = feb, 842 year = "1970", 843 CODEN = "CACMA2", 844 ISSN = "0001-0782", 845 bibdate = "Tue Mar 25 13:26:09 MST 1997", 846 acknowledgement = ack-nhfb, 847 classcodes = "C7400 (Engineering computing); C5540 (Terminals and graphic displays)", 848 corpsource = "Bell Telephone Labs. Inc., Holmdel, NJ, USA", 849 keywords = "applications of computers; computers; control system synthesis; electrical engineering; engineering applications of; online operation; sampled data systems; simulation", 850} 851 852@Article{White:1970:AAN, 853 author = "J. S. White", 854 title = "{ACM} Algorithm 373: Number of Doubly Restricted Partitions", 855 journal = j-CACM, 856 volume = "13", 857 number = "2", 858 pages = "120--120", 859 month = feb, 860 year = "1970", 861 CODEN = "CACMA2", 862 ISSN = "0001-0782", 863 bibdate = "Tue Mar 25 13:26:09 MST 1997", 864 acknowledgement = ack-nhfb, 865 classcodes = "C7300 (Natural sciences computing)", 866 corpsource = "Univ. Minnesota, Minneapolis, MN, USA", 867 keywords = "combinatorial mathematics; subroutines", 868} 869 870@Article{White:1970:AAR, 871 author = "J. S. White", 872 title = "{ACM} Algorithm 374: Restricted Partition Generator", 873 journal = j-CACM, 874 volume = "13", 875 number = "2", 876 pages = "120--120", 877 month = feb, 878 year = "1970", 879 CODEN = "CACMA2", 880 ISSN = "0001-0782", 881 bibdate = "Tue Mar 25 13:26:09 MST 1997", 882 acknowledgement = ack-nhfb, 883 classcodes = "C7300 (Natural sciences computing)", 884 corpsource = "Univ. Minnesota, Minneapolis, MN, USA", 885 keywords = "combinatorial mathematics; subroutines", 886} 887 888@Article{Spath:1970:AAF, 889 author = "H. Sp{\"{a}}th", 890 title = "{ACM} Algorithm 375: Fitting Data to One Exponential", 891 journal = j-CACM, 892 volume = "13", 893 number = "2", 894 pages = "120--121", 895 month = feb, 896 year = "1970", 897 CODEN = "CACMA2", 898 ISSN = "0001-0782", 899 bibdate = "Thu Sep 08 09:33:48 1994", 900} 901 902@Article{Spath:1970:FDO, 903 author = "H. Spath", 904 title = "Fitting data to one exponential", 905 journal = j-CACM, 906 volume = "13", 907 number = "2", 908 pages = "120--121", 909 month = feb, 910 year = "1970", 911 CODEN = "CACMA2", 912 ISSN = "0001-0782", 913 bibdate = "Tue Mar 25 13:26:09 MST 1997", 914 acknowledgement = ack-nhfb, 915 classcodes = "C4150 (Nonlinear and functional equations); C7300 (Natural sciences computing)", 916 corpsource = "Inst. Neutronenphysik Reaktortechnik, Karlsruhe, West Germany", 917 keywords = "least squares approximations; nonlinear equations; subroutines", 918} 919 920@Article{Spath:1970:AAL, 921 author = "H. Sp{\"{a}}th", 922 title = "{ACM} Algorithm 376: Least Squares Fit by {$f(x)=A\cos(Bx+C)$}", 923 journal = j-CACM, 924 volume = "13", 925 number = "2", 926 pages = "121--122", 927 month = feb, 928 year = "1970", 929 CODEN = "CACMA2", 930 ISSN = "0001-0782", 931 bibdate = "Tue Mar 25 13:26:09 MST 1997", 932 acknowledgement = ack-nhfb, 933 classcodes = "C4150 (Nonlinear and functional equations); C7300 (Natural sciences computing)", 934 corpsource = "Inst. Neutronenphysik, Reaktortechnik, Karlsruhe, West Germany", 935 keywords = "least squares approximations; nonlinear equations; subroutines", 936} 937 938@Article{Morgan:1970:SCSb, 939 author = "H. L. Morgan", 940 title = "Spelling correction in systems programs", 941 journal = j-CACM, 942 volume = "13", 943 number = "3", 944 pages = "90--94", 945 month = mar, 946 year = "1970", 947 CODEN = "CACMA2", 948 ISSN = "0001-0782", 949 bibdate = "Tue May 28 09:49:07 1996", 950 abstract = "Several specialized techniques are shown for efficiently incorporating spelling correction algorithms in to compilers and operating systems. These include the use of syntax and semantics information, the organization of restricted keyword and symbol tables, and the consideration of a limited class of spelling errors. Sample 360 coding for performing spelling correction is presented. By using systems which perform spelling correction, the number of debugging runs per program has been decreased, saving both programmer and machine time.", 951 keywords = "compilers; computer science and automata; debugging; diagnostics; error correction; error detection; lexical analysis systems programming; misspelling; operating systems; spelling correction", 952 xxnote = "Check issue number: 2 or 3??", 953} 954 955@Article{Fenichel:1970:PTP, 956 author = "R. R. Fenichel and J. Weizenbaum and J. C. Yochelson", 957 title = "A Program to Teach Programming", 958 journal = j-CACM, 959 volume = "13", 960 number = "3", 961 pages = "141--146", 962 month = mar, 963 year = "1970", 964 CODEN = "CACMA2", 965 ISSN = "0001-0782", 966 bibdate = "Tue Mar 25 13:26:09 MST 1997", 967 bibsource = "Compendex database", 968 abstract = "The TEACH system was developed at MIT to ease the cost and improve the results of elementary instruction in programming. To the student, TEACH offers loosely guided experience with a conversational language which was designed with teaching in mind. Faculty involvement is limited. At the heart of the TEACH system is an interactive language which somewhat resembles Joss, but is somewhat more amenable to rational explanation. Surrounding the language processor is a teaching system which presents lessons to the student, supervises his progress, and permits him to exercise his skills. A term of experience with TEACH is discussed. Pedagogically, the system appears to be successful; straightforward reimplementation will make it economically successful as well.", 969 acknowledgement = ack-nhfb, 970 classcodes = "C0310 (EDP management); C6150Z (Other systems operation programs)", 971 corpsource = "Massachusetts Inst. Technol., Cambridge, MA, USA", 972 journalabr = "Commun ACM", 973 keywords = "computer applications; computer-assisted learning; computers, programming; education; elementary programming; engineering education; programming; TEACH; UNCL; utility programs", 974} 975 976@Article{Slagle:1970:EMT, 977 author = "J. R. Slagle and J. K. Dixon", 978 title = "Experiments with the {M \& N} Tree-Searching Program", 979 journal = j-CACM, 980 volume = "13", 981 number = "3", 982 pages = "147--154, 159", 983 month = mar, 984 year = "1970", 985 CODEN = "CACMA2", 986 ISSN = "0001-0782", 987 bibdate = "Tue Mar 25 13:26:09 MST 1997", 988 bibsource = "Compendex database", 989 abstract = "The M \& N procedure is an improvement to the mini-max backing-up procedure widely used in computer programs for game-playing and other purposes. It is based on the principle that it is desirable to have many options when making decisions in the face of uncertainty. The mini-max procedure assigns to a MAX (MIN) node the value of the highest (lowest) valued successor to that node. The M \& N procedure assigns to a MAX (MIN) node some function of the M (N) highest (lowest) valued successors. An M \& N procedure was written in LISP to play the game of kalah, and it was demonstrated that the M \& Nprocedure is significantly superior to the mini-max procedure. The statistical significance of important conclusions is given. Since information on statistical significance has often been lacking in papers on computer experiments in the artificial intelligence field, these experiments can perhaps serve as a model for future work.", 990 acknowledgement = ack-nhfb, 991 classcodes = "C1230 (Artificial intelligence)", 992 corpsource = "Education Welfare, Bethesda, MD, USA", 993 journalabr = "Commun ACM", 994 keywords = "arg; artificial intelligence; automata theory; computers; game theory; heuristic programming; optimisation; programming; trees (mathematics)", 995} 996 997@Article{Batson:1970:MSS, 998 author = "A. Batson and Shy-Ming M. Ju and D. C. Wood", 999 title = "Measurements of Segment Size", 1000 journal = j-CACM, 1001 volume = "13", 1002 number = "3", 1003 pages = "155--159", 1004 month = mar, 1005 year = "1970", 1006 CODEN = "CACMA2", 1007 ISSN = "0001-0782", 1008 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1009 bibsource = "Compendex database", 1010 abstract = "Distributions of segment sizes measured under routine operating conditions on a computer system which utilizes variable sized segments (the Burroughs B5500) are discussed. The most striking feature of the measurements is the large number of small segments-about 60\% of the segments in use contain less than 40 words. Although the results are certainly not installation independent, and although they are particularly influenced by features of the B5500 ALGOL system, they should be relevant to the design of new computer systems, especially with respect to the organization of paging schemes.", 1011 acknowledgement = ack-nhfb, 1012 classcodes = "C6150J (Operating systems)", 1013 corpsource = "Univ. Virginia, Charlottesville, VA, USA", 1014 journalabr = "Commun ACM", 1015 keywords = "computers; dynamic memory management; operating systems; storage allocation", 1016} 1017 1018@Article{Watson:1970:ANM, 1019 author = "G. A. Watson", 1020 title = "On an Algorithm for Nonlinear Minimax Approximation", 1021 journal = j-CACM, 1022 volume = "13", 1023 number = "3", 1024 pages = "160--162", 1025 month = mar, 1026 year = "1970", 1027 CODEN = "CACMA2", 1028 ISSN = "0001-0782", 1029 MRclass = "90.50 (65.00)", 1030 MRnumber = "44\#3694", 1031 mrreviewer = "R. W. Cottle", 1032 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1033 bibsource = "Compendex database", 1034 abstract = "Certain nonlinear minimax approximation problems are characterized by properties which permit the application of special algorithms, mainly, based on the exchange algorithms of E. Y. Remes (1934, 1935), for their solution. The application to problems of this type of a general nonlinear algorithm due to M. R. Osborne and G. A. Watson (1969) is considered. Examples are given to illustrate that this algorithm can give satisfactory results and, in particular, can successfully solve problems which lead to difficulties with the more conventional specialist methods.", 1035 acknowledgement = ack-nhfb, 1036 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)", 1037 corpsource = "Australian Nat. Univ., Canberra, Australia", 1038 journalabr = "Commun ACM", 1039 keywords = "linear programming; mathematics; minimax approximation; nonlinear approximation; numerical methods; optimisation; THO", 1040} 1041 1042@Article{Schweikert:1970:CEI, 1043 author = "D. G. Schweikert", 1044 title = "A Comparison of Error Improvement Estimates for Adaptive Trapezoid Integration", 1045 journal = j-CACM, 1046 volume = "13", 1047 number = "3", 1048 pages = "163--166", 1049 month = mar, 1050 year = "1970", 1051 CODEN = "CACMA2", 1052 ISSN = "0001-0782", 1053 MRclass = "65.55", 1054 MRnumber = "44\#7751", 1055 mrreviewer = "R. E. Barnhill", 1056 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1057 bibsource = "Compendex database", 1058 abstract = "Various simple choices of error improvement estimates for the trapezoid rule are studied to demonstrate a comparison procedure which is relatively independent of the profusion of adaptive search and stopping strategies. Comparisons are based on $x^r1$; the inclusion of the noninteger powers makes this more realistic than the usual polynomial based comparison. Behavior near the singularity was found to be the dominant factor, and a new estimate, based on a constant curvature assumption and parametric differences, was considered slightly better than the other choices considered.", 1059 acknowledgement = ack-nhfb, 1060 classcodes = "C4110 (Error analysis in numerical methods); C4160 (Numerical integration and differentiation)", 1061 corpsource = "Bell Telephone Labs. Inc., Murray Hill, NJ, USA", 1062 journalabr = "Commun ACM", 1063 keywords = "adaptive integration; error analysis; error improvement estimate; integration; mathematics; nonpolynomial error criteria; numerical methods; re; trapezoid rule", 1064} 1065 1066@Article{Schwarcz:1970:DQA, 1067 author = "Robert M. Schwarcz and John F. Burger and Robert F. Simmons", 1068 title = "A Deductive Question Answerer for Natural Language Inference", 1069 journal = j-CACM, 1070 volume = "13", 1071 number = "3", 1072 pages = "167--183", 1073 month = mar, 1074 year = "1970", 1075 CODEN = "CACMA2", 1076 ISSN = "0001-0782", 1077 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1078 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 1079 abstract = "The question-answering aspects of the Protosynthex III prototype language processing system are described and exemplified in detail. The system is written in LISP 1. 5 and operates on the Q-32 time-sharing system. The system's data structures and their semantic organization, the deductive question-answering formalism of relational properties and complex-relation-forming operators, and the question-answering procedures which employ these features in their operation are all described and illustrated. Examples of the system's performance and of the limitations of its question-answering capability are presented and discussed. It is shown that the use of semantic information in deductive question answering greatly facilitates the process, and that a top-down procedure which works from question to answer enables effective use to be made of this information.", 1080 acknowledgement = ack-nhfb, 1081 annote = "Deductive inference driven by English: PROTOSYNTHEX III", 1082 classcodes = "C7820 (Humanities computing)", 1083 corpsource = "System Dev. Corp., Santa Monica, CA, USA", 1084 journalabr = "Commun ACM", 1085 keywords = "artificial intelligence; automata theory; computational linguistics", 1086 keywords = "artificial intelligence; computational linguistics; information retrieval; language translation and linguistics", 1087} 1088 1089@Article{Cardenas:1970:PLP, 1090 author = "A. F. Cardenas and W. J. Karplus", 1091 title = "{PDEL}, a Language for Partial Differential Equations", 1092 journal = j-CACM, 1093 volume = "13", 1094 number = "3", 1095 pages = "184--191 (or 184--190??)", 1096 month = mar, 1097 year = "1970", 1098 CODEN = "CACMA2", 1099 ISSN = "0001-0782", 1100 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1101 bibsource = "Compendex database", 1102 abstract = "Conventional computer methods available to solve continuous system problems characterized by partial differential equations are very time-consuming and cumbersome. A convenient, easy to learn and to use, high level problem oriented language to solve and study partial differential equation problems has been designed; a practical translator for the language has also been designed, and a working version of it has been constructed for a significant portion of the language. This Partial Differential Equation Language, PDEL, is outlined, and the highlights of the translator are briefly summarized. PDEL can handle a large variety of fields. Time-dependent and time-independent fields can be defined. Any size of grid can be used to approximate regular and irregular geometries. Linear, nonlinear, uniform and nonuniform fields can be treated.", 1103 acknowledgement = ack-nhfb, 1104 classcodes = "C6140D (High level languages)", 1105 corpsource = "Univ. California, Los Angeles, CA, USA", 1106 journalabr = "Commun ACM", 1107 keywords = "computers; differential equations; mathematics; problem oriented languages", 1108} 1109 1110@Article{Levine:1970:AAS, 1111 author = "M. J. Levine and S. M. Swanson", 1112 title = "{ACM} Algorithm 377: Symbolic Expansion of Algebraic Expressions", 1113 journal = j-CACM, 1114 volume = "13", 1115 number = "3", 1116 pages = "191--192", 1117 month = mar, 1118 year = "1970", 1119 CODEN = "CACMA2", 1120 ISSN = "0001-0782", 1121 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1122 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/acm.bib", 1123 acknowledgement = ack-nhfb, 1124 classcodes = "C7300 (Natural sciences computing)", 1125 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 1126 keywords = "algebra; subroutines", 1127 xxauthor = "J. L. Levine", 1128} 1129 1130@Article{Kailas:1970:AMC, 1131 author = "M. V. Kailas", 1132 title = "Another method of converting from hexadecimal to decimal", 1133 journal = j-CACM, 1134 volume = "13", 1135 number = "3", 1136 pages = "193--193", 1137 month = mar, 1138 year = "1970", 1139 CODEN = "CACMA2", 1140 ISSN = "0001-0782", 1141 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1142 acknowledgement = ack-nhfb, 1143 classcodes = "C5230 (Digital arithmetic methods)", 1144 keywords = "digital arithmetic", 1145} 1146 1147@Article{Pager:1970:NSP, 1148 author = "D. Pager", 1149 title = "A number system for the permutations", 1150 journal = j-CACM, 1151 volume = "13", 1152 number = "3", 1153 pages = "193--193", 1154 month = mar, 1155 year = "1970", 1156 CODEN = "CACMA2", 1157 ISSN = "0001-0782", 1158 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1159 acknowledgement = ack-nhfb, 1160 classcodes = "C5230 (Digital arithmetic methods)", 1161 corpsource = "Univ. Hawaii, Honolulu, HI, USA", 1162 keywords = "number theory", 1163} 1164 1165@Article{Dempster:1970:CPA, 1166 author = "J. R. H. Dempster", 1167 title = "Comment on a Paging Anomaly", 1168 journal = j-CACM, 1169 volume = "13", 1170 number = "3", 1171 pages = "193--194", 1172 month = mar, 1173 year = "1970", 1174 CODEN = "CACMA2", 1175 ISSN = "0001-0782", 1176 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1177 acknowledgement = ack-nhfb, 1178 classcodes = "C4290 (Other computer theory)", 1179 corpsource = "Univ. British Columbia, Vancouver, BC, Canada", 1180 keywords = "computation theory; demand paging; paging machines; replacement algorithm; storage allocation", 1181} 1182 1183@Article{Maurer:1970:NCI, 1184 author = "H. A. Maurer", 1185 title = "A Note on the Complement of Inherently Ambiguous Context-Free Languages", 1186 journal = j-CACM, 1187 volume = "13", 1188 number = "3", 1189 pages = "194--194", 1190 month = mar, 1191 year = "1970", 1192 CODEN = "CACMA2", 1193 ISSN = "0001-0782", 1194 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1195 acknowledgement = ack-nhfb, 1196 classcodes = "C4210 (Formal logic)", 1197 corpsource = "Univ. Calgary, Alta., Canada", 1198 keywords = "ambiguity; bounded language; Chomsky-language; complement; context-free language; formal languages; inherent ambiguity; phrase structure language; production system; type 2 language", 1199} 1200 1201@Article{Hsiao:1970:CFS, 1202 author = "D. K. Hsiao and F. D. Harary", 1203 title = "Corrigenda: {``A Formal System for Information Retrieval from Files''}", 1204 journal = j-CACM, 1205 volume = "13", 1206 number = "3", 1207 pages = "266--266", 1208 month = mar, 1209 year = "1970", 1210 CODEN = "CACMA2", 1211 ISSN = "0001-0782", 1212 bibdate = "Tue Dec 26 18:33:42 1995", 1213 note = "See \cite{Hsiao:1970:FSI}.", 1214} 1215 1216@Article{DeSalvio:1970:CCI, 1217 author = "A. J. DeSalvio and J. G. Purdy and J. Rau", 1218 title = "Creation and Control of Internal Data Bases Under a {Fortran} Programming Environment", 1219 journal = j-CACM, 1220 volume = "13", 1221 number = "4", 1222 pages = "211--215", 1223 month = apr, 1224 year = "1970", 1225 CODEN = "CACMA2", 1226 ISSN = "0001-0782", 1227 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1228 bibsource = "Compendex database", 1229 abstract = "A method is described for the definition of a user's COMMON structure and the automatic generation of the necessary COMMON, DIMENSION, EQUIVALENCE, and type declarations for each of the user's routines. The definition for the COMMON is contained in an easy to modify form, thus allowing the control of general communications of data between routines. The described system has been implemented on the IBM 7094, CDC 6000 series, and the IBM 360. The method has proved to be invaluable for the definition and control of COMMON in many large-scale programs.", 1230 acknowledgement = ack-nhfb, 1231 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", 1232 corpsource = "TRW Systems, Redondo Beach and Sunnyvale, CA, USA", 1233 journalabr = "Commun ACM", 1234 keywords = "computers; data handling; data structures; FORTRAN", 1235} 1236 1237@Article{Mills:1970:SDP, 1238 author = "H. D. Mills", 1239 title = "Syntax-Directed Documentation for {PL360}", 1240 journal = j-CACM, 1241 volume = "13", 1242 number = "4", 1243 pages = "216--222", 1244 month = apr, 1245 year = "1970", 1246 CODEN = "CACMA2", 1247 ISSN = "0001-0782", 1248 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1249 bibsource = "Compendex database", 1250 abstract = "The language PL360, together with its phrase structure grammar, is used as a concrete basis for illustrating an idea called syntax-directed documentation. This idea is-to use the phrase structure of a program to define the structure of a formal documentation for that program; to use the syntactic types and identifiers in the resulting structure to trigger the automatic formation of questions to the programmer, whose answers will become part of that documentation; and to provide automatic storage and retrieval facilities so that other programmers who want to understand or modify the index in various ways by syntactic types and objects. A small PL360 program, already found in the literature, is worked out as an example.", 1251 acknowledgement = ack-nhfb, 1252 classcodes = "C6140D (High level languages); C6150G (Diagnostic, testing, debugging and evaluating systems)", 1253 corpsource = "IBM, Gaithersburg, MD, USA", 1254 journalabr = "Commun ACM", 1255 keywords = "computers; computers, programming; documentation; procedure oriented languages; Program and system", 1256} 1257 1258@Article{Bayer:1970:SCC, 1259 author = "Rudolf Bayer and Christoph Witzgall", 1260 title = "Some Complete Calculi for Matrices", 1261 journal = j-CACM, 1262 volume = "13", 1263 number = "4", 1264 pages = "223--237", 1265 month = apr, 1266 year = "1970", 1267 CODEN = "CACMA2", 1268 ISSN = "0001-0782", 1269 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1270 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/reynolds.bib", 1271 abstract = "A matrix calculus is introduced with the intention of developing data structures suitable for a high level algorithmic language for mathematical programming. It is shown how the special structure of matrices can be described and utilized for efficient computing by saving memory space and superfluous operations. Sequences of matrices (and sequences of sequences of matrices) are considered, and matrix operators are extended to sequence operators and cumulative operators. Algorithms are given which use symbol manipulation of matrix expressions so as to find the forms best suited for computation. These forms are called normalforms. Several completeness results are obtained in the sense that for each expression an equivalent expression in normal form can be found within a specified calculus.", 1272 acknowledgement = ack-nhfb, 1273 checked = "29 June 1993", 1274 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)", 1275 corpsource = "Boeing Sci. Res. Labs., Seattle, WA, USA", 1276 journalabr = "Commun ACM", 1277 keywords = "algorithmic languages; computers; computers, programming; data structures; mathematical; mathematics; matrix algebra; programming", 1278} 1279 1280@Article{BrinchHansen:1970:NMS, 1281 author = "P. {Brinch Hansen}", 1282 title = "The Nucleus of a Multiprogramming System", 1283 journal = j-CACM, 1284 volume = "13", 1285 number = "4", 1286 pages = "238--241, 250", 1287 month = apr, 1288 year = "1970", 1289 CODEN = "CACMA2", 1290 ISSN = "0001-0782", 1291 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1292 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib", 1293 abstract = "The philosophy and structure is described of a multiprogramming system that can be extended with a hierarchy of operating systems to suit diverse requirements of program scheduling and resource allocation. The system nucleus simulates an environment in which program execution and input\slash output are handled uniformly as parallel, cooperating processes. A fundamental set of primitives allows the dynamic creation and control of a hierarchy of processes as well as the communication among them.", 1294 acknowledgement = ack-nhfb, 1295 classcodes = "C6150J (Operating systems)", 1296 corpsource = "A/S Regnecentralen, Copenhagen, Denmark", 1297 journalabr = "Commun ACM", 1298 keywords = "computers; computers, time sharing; operating systems", 1299 keywords = "multiprogramming", 1300} 1301 1302@Article{Eastman:1970:RSP, 1303 author = "C. M. Eastman", 1304 title = "Representations for Space Planning", 1305 journal = j-CACM, 1306 volume = "13", 1307 number = "4", 1308 pages = "242--250", 1309 month = apr, 1310 year = "1970", 1311 CODEN = "CACMA2", 1312 ISSN = "0001-0782", 1313 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1314 bibsource = "Compendex database", 1315 abstract = "Problems involving the arrangement of objects in two-or three-space where the objective function primarily consists of derivatives of the distance between objects or their arrangement are called space planning problems. The representational requirements for this problem area are defined and compared with current computer graphic languages. Four alternative data structures that allow automated space planning are described and compared.", 1316 acknowledgement = ack-nhfb, 1317 classcodes = "C6120 (File organisation)", 1318 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 1319 journalabr = "Commun ACM", 1320 keywords = "computer-aided design; computers; computers, language; data structures; design automation; graphic methods; graphics", 1321} 1322 1323@Article{Pomeranz:1970:CMP, 1324 author = "J. E. Pomeranz and R. L. {Weil, Jr.}", 1325 title = "The cyclical majority problem", 1326 journal = j-CACM, 1327 volume = "13", 1328 number = "4", 1329 pages = "251--254", 1330 month = apr, 1331 year = "1970", 1332 CODEN = "CACMA2", 1333 ISSN = "0001-0782", 1334 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1335 bibsource = "Compendex database", 1336 abstract = "The unsolved combinational problem of the cyclical majority is presented and some mew, simulated results for 3, 4, 5,\ldots{}, 40 issues and 3, 5, 7,\ldots{}, 37 judges are reported. The method devised for simulating the voting process to estimate the probabilities does not solve the problem, but appears much more efficient than one previous simulation and more accurate than another.", 1337 acknowledgement = ack-nhfb, 1338 classcodes = "C1160 (Combinatorial mathematics)", 1339 corpsource = "Univ. Chicago, IL, USA", 1340 journalabr = "Commun ACM", 1341 keywords = "combinatorial mathematics; computers, simulation; simulation; statistical methods", 1342} 1343 1344@Article{Nilson:1970:CSU, 1345 author = "E. N. Nilson", 1346 title = "Cubic Splines on Uniform Meshes", 1347 journal = j-CACM, 1348 volume = "13", 1349 number = "4", 1350 pages = "255--258", 1351 month = apr, 1352 year = "1970", 1353 CODEN = "CACMA2", 1354 ISSN = "0001-0782", 1355 MRclass = "65.20", 1356 MRnumber = "44\#1189", 1357 mrreviewer = "C. A. Hall", 1358 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1359 bibsource = "Compendex database", 1360 abstract = "A very simple procedure is presented for constructing cubic splines, periodic or nonperiodic, on uniform meshes. Arcs of two cubics suffice to construct a basis of cardinal splines. An algorithm is given which requires only minimal storage and computation and permits easy trade-off of one against the other. The application of these devices is of fundamental importance in the area of computer graphics where substantial savings in computing time and storage requirements have special significance.", 1361 acknowledgement = ack-nhfb, 1362 classcodes = "C4130 (Interpolation and function approximation)", 1363 corpsource = "Pratt and Whitney Aircraft, East Hartford, CT, USA", 1364 journalabr = "Commun ACM", 1365 keywords = "cardinal splines; computers; mathematics; numerical methods; polynomials; simple spline representation; uniform mesh splines", 1366} 1367 1368@Article{Pankiewicz:1970:AAD, 1369 author = "W. Pankiewicz", 1370 title = "{ACM} Algorithm 378: Discretized {Newton}-like Method for Solving a System of Simultaneous Nonlinear Equations", 1371 journal = j-CACM, 1372 volume = "13", 1373 number = "4", 1374 pages = "259--260", 1375 month = apr, 1376 year = "1970", 1377 CODEN = "CACMA2", 1378 ISSN = "0001-0782", 1379 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1380 acknowledgement = ack-nhfb, 1381 classcodes = "C4150 (Nonlinear and functional equations); C7300 (Natural sciences computing)", 1382 keywords = "nonlinear equations; numerical methods; subroutines", 1383} 1384 1385@Article{Lyness:1970:AAS, 1386 author = "J. N. Lyness", 1387 title = "{ACM} Algorithm 379: {SQUANK (Simpson Quadrature Used Adaptively-Noise Killed)}", 1388 journal = j-CACM, 1389 volume = "13", 1390 number = "4", 1391 pages = "260--263 (or 260--262??)", 1392 month = apr, 1393 year = "1970", 1394 CODEN = "CACMA2", 1395 ISSN = "0001-0782", 1396 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1397 acknowledgement = ack-nhfb, 1398 classcodes = "C4160 (Numerical integration and differentiation); C7300 (Natural sciences computing)", 1399 corpsource = "Argonne Nat. Lab., IL, USA", 1400 keywords = "integration; subroutines", 1401} 1402 1403@Article{Heess:1970:CPW, 1404 author = "W. F. {Heess, Jr.}", 1405 title = "Comments on a paper by {Wallace} and {Mason}", 1406 journal = j-CACM, 1407 volume = "13", 1408 number = "4", 1409 pages = "264--265", 1410 month = apr, 1411 year = "1970", 1412 CODEN = "CACMA2", 1413 ISSN = "0001-0782", 1414 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1415 acknowledgement = ack-nhfb, 1416 classcodes = "C6150J (Operating systems)", 1417 keywords = "multiprogramming; storage allocation", 1418} 1419 1420@Article{Smith:1970:CMU, 1421 author = "J. L. Smith", 1422 title = "Comment on multiprogramming under a page on demand strategy", 1423 journal = j-CACM, 1424 volume = "13", 1425 number = "4", 1426 pages = "265--265", 1427 month = apr, 1428 year = "1970", 1429 CODEN = "CACMA2", 1430 ISSN = "0001-0782", 1431 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1432 acknowledgement = ack-nhfb, 1433 classcodes = "C6150J (Operating systems)", 1434 corpsource = "CSIRO, Canberra City, ACT, Australia", 1435 keywords = "multiprogramming", 1436} 1437 1438@Article{deVries:1970:CLM, 1439 author = "Ronald C. {de Vries}", 1440 title = "Comment on {Lawler}'s Multilevel {Boolean} minimization", 1441 journal = j-CACM, 1442 volume = "13", 1443 number = "4", 1444 pages = "265--266", 1445 month = apr, 1446 year = "1970", 1447 CODEN = "CACMA2", 1448 ISSN = "0001-0782", 1449 MRclass = "68.00 (94.00)", 1450 MRnumber = "44\#7801", 1451 mrreviewer = "E. Maliszewski", 1452 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1453 acknowledgement = ack-nhfb, 1454 classcodes = "C4230 (Switching theory)", 1455 corpsource = "Univ. New Mexico, Albuquerque, NM, USA", 1456 keywords = "generalized prime implicants; incompletely specified functions; minimal forms; minimization; multilevel logic design", 1457 keywords = "minimisation of switching nets", 1458} 1459 1460@Article{Knight:1970:ACP, 1461 author = "K. R. Knight", 1462 title = "An {Algol} construction for procedures as parameters of procedures", 1463 journal = j-CACM, 1464 volume = "13", 1465 number = "4", 1466 pages = "266--266", 1467 month = apr, 1468 year = "1970", 1469 CODEN = "CACMA2", 1470 ISSN = "0001-0782", 1471 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1472 acknowledgement = ack-nhfb, 1473 classcodes = "C6140D (High level languages)", 1474 corpsource = "Univ. Surrey, Guildford, UK", 1475 keywords = "ALGOL; programming", 1476} 1477 1478@Article{Wirth:1970:CMM, 1479 author = "N. Wirth", 1480 title = "Corrigenda: {``On Multiprogramming, Machine Coding, and Computer Organization}''", 1481 journal = j-CACM, 1482 volume = "13", 1483 number = "4", 1484 pages = "266--266", 1485 month = apr, 1486 year = "1970", 1487 CODEN = "CACMA2", 1488 ISSN = "0001-0782", 1489 bibdate = "Fri Jan 17 18:23:53 1997", 1490 note = "See \cite{Wirth:1969:MMC}.", 1491} 1492 1493@Article{Hodes:1970:PSO, 1494 author = "L. Hodes", 1495 title = "Programming System for the On-Line Analysis of Biomedical Images", 1496 journal = j-CACM, 1497 volume = "13", 1498 number = "5", 1499 pages = "279--283, 286", 1500 month = may, 1501 year = "1970", 1502 CODEN = "CACMA2", 1503 ISSN = "0001-0782", 1504 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1505 bibsource = "Compendex database", 1506 abstract = "A preliminary description of the software for a computer-display system is given with special emphasis on the man-machine interaction. This system is intended for a wide variety of biomedical applications. As an example, the methods are applied to the karyotyping of chromosomes. The system is separated into four programming tasks-picture transformations, file maintenance, picture structuring, and display management. Picture structuring is considered as the vehicle for man-machine communication. A prototype data format for pictures, called a picture-form, is developed. Structure operators are defined which manipulate picture-forms to produce new picture-forms. Many of the ideas are taken from the symbolic mathematical laboratory at MIT conceived by M. Minsky.", 1507 acknowledgement = ack-nhfb, 1508 classcodes = "C7300 (Natural sciences computing)", 1509 corpsource = "Dept. Health, Education Welfare, Bethasda, MD, USA", 1510 journalabr = "Commun ACM", 1511 keywords = "bioengineering, computer applications; biology; computers; computers, programming; data handling; data reduction and analysis; graphics; image processing; machine systems; man-; medicine; pattern recognition", 1512} 1513 1514@Article{Sitton:1970:OGA, 1515 author = "G. A. Sitton", 1516 title = "Operations on Generalized Arrays with the {Genie} Compiler", 1517 journal = j-CACM, 1518 volume = "13", 1519 number = "5", 1520 pages = "284--286", 1521 month = may, 1522 year = "1970", 1523 CODEN = "CACMA2", 1524 ISSN = "0001-0782", 1525 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1526 bibsource = "Compendex database", 1527 abstract = "Operations on vectors, matrices, and higher dimensional storage arrays are standard features of most compilers today. The elements of such structures are usually restricted to be scalars For many sophisticated applications this restriction can impose cumbersome data representations. An efficient system has been devised and implemented which allows the elements of multidimensional arrays to themselves be multidimensional arrays. This system was developed from a storage structure in which the location, length, and content of each array is described by a codeword which can be interpreted by the system. Codewords may describe arrays containing more codewords, thus providing all needed descriptive information for hyperstructures of any form.", 1528 acknowledgement = ack-nhfb, 1529 classcodes = "C6130 (Data handling techniques); C6150C (Compilers, interpreters and other processors)", 1530 corpsource = "Rice Univ., Houston, TX, USA", 1531 journalabr = "Commun ACM", 1532 keywords = "computers; computers, operating systems; data handling; data structures; E P; matrix operations; multidimensional arrays; program compilers; programming", 1533} 1534 1535@Article{Vere:1970:TEE, 1536 author = "S. Vere", 1537 title = "Translation Equations (Errata)", 1538 journal = j-CACM, 1539 volume = "13", 1540 number = "5", 1541 pages = "286--286", 1542 month = may, 1543 year = "1970", 1544 CODEN = "CACMA2", 1545 ISSN = "0001-0782", 1546 bibdate = "Fri Jan 17 18:28:27 1997", 1547 note = "See \cite{Vere:1970:TE}.", 1548 acknowledgement = ack-nhfb, 1549} 1550 1551@Article{Sasser:1970:ASS, 1552 author = "W. E. Sasser and D. S. Burdick and D. A. Graham and T. H. Naylor", 1553 title = "Application of Sequential Sampling to Simulation. an Example Inventory Model", 1554 journal = j-CACM, 1555 volume = "13", 1556 number = "5", 1557 pages = "287--296", 1558 month = may, 1559 year = "1970", 1560 CODEN = "CACMA2", 1561 ISSN = "0001-0782", 1562 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1563 bibsource = "Compendex database", 1564 abstract = "Four different sequential sampling procedures are applied to the analysis of data generated by a computer simulation experiment with a multi-item inventory model. For each procedure the cost of computer time required to achieve given levels of statistical precision is calculated. Also the cost of computer time using comparable fixed sample size methods is calculated. The computer costs of fixed sample size procedures vs sequential sampling procedures are compared. Details are given for the inventory model and sampling procedures.", 1565 acknowledgement = ack-nhfb, 1566 classcodes = "C1220 (Simulation, modelling and identification)", 1567 corpsource = "Duke Univ., Durham, NC, USA", 1568 journalabr = "Commun ACM", 1569 keywords = "computers; control; data reduction and analysis; industrial management, data processing; inventory control; modelling; sequential sampling; simulation; statistical methods; stock", 1570} 1571 1572@Article{Loeckx:1970:ACB, 1573 author = "J. Loeckx", 1574 title = "Algorithm for the Construction of Bounded-Context Parsers", 1575 journal = j-CACM, 1576 volume = "13", 1577 number = "5", 1578 pages = "297--307", 1579 month = may, 1580 year = "1970", 1581 CODEN = "CACMA2", 1582 ISSN = "0001-0782", 1583 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1584 bibsource = "Compendex database", 1585 abstract = "An algorithm is described which accepts an arbitrary context-free grammar and constructs a bounded-context parser for it whenever such a parser exists. The definition of a context-free grammar and the working of a bounded-context parser are recalled. The notion of reduction class for a context-free grammar is then introduced and its connection with the structure of a bounded-context parser is indicated. Next, pushdown automata which generate the different reduction classes of a context-free grammar are defined. Finally, the algorithm is described; it essentially carries out an exhaustive study of all possible runs of the pushdown automata generating the reduction classes. The utility of the algorithm is discussed in the light of the experience gained from its use in compiler design.", 1586 acknowledgement = ack-nhfb, 1587 classcodes = "C4210 (Formal logic)", 1588 corpsource = "MBLE Res. Lab., Brussels, Belgium", 1589 journalabr = "Commun ACM", 1590 keywords = "automata theory; compilers; computational linguistics; computers, language; context-free grammars; formal languages; grammars; low", 1591} 1592 1593@Article{Reynolds:1970:GST, 1594 author = "John C. Reynolds", 1595 title = "{GEDANKEN} --- {A} Simple Typeless Language Based on the Principle of Completeness and the Reference Concept", 1596 journal = j-CACM, 1597 volume = "13", 1598 number = "5", 1599 pages = "308--319", 1600 month = may, 1601 year = "1970", 1602 CODEN = "CACMA2", 1603 ISSN = "0001-0782", 1604 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1605 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/reynolds.bib", 1606 abstract = "In this experimental programming language, any value which is permitted in some context of the language is permissible in any other meaningful context. In particular, functions and labels are permissible results of functions and values of variables. Assignment and indirect addressing are formalized by introducing values, called references, which in turn possess other values. The assignment operation always affects the relation between some reference and its values. All composed data structures are treated as functions. Type declarations are not permitted. Any data structure may be implicit; i.e., it may be specified by giving an arbitrary algorithm for computing or accessing its components. The existence of label variables permits the construction of coroutines, quasi-parallel processes, and other unorthodox control mechanisms. A variety of programming examples illustrates the generality of the language. Limitations and possible extensions are discussed briefly.", 1607 acknowledgement = ack-nhfb, 1608 checked = "4 September 1990", 1609 classcodes = "C6140D (High level languages)", 1610 corpsource = "Argonne Nat. Lab., IL, USA", 1611 journalabr = "Commun ACM", 1612 keywords = "computers; data structures; gedanken; procedure oriented languages; programming languages", 1613} 1614 1615@Article{Crespi-Reghizzi:1970:LTG, 1616 author = "S. Crespi-Reghizzi and R. Morpurgo", 1617 title = "A language for treating graphs", 1618 journal = j-CACM, 1619 volume = "13", 1620 number = "5", 1621 pages = "319--323", 1622 month = may, 1623 year = "1970", 1624 CODEN = "CACMA2", 1625 ISSN = "0001-0782", 1626 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1627 bibsource = "Compendex database", 1628 abstract = "A language for the representation of graphs is described, and the formulation of graph operations such as node and\slash or link deletion or insertion, union, intersection, comparison, and traversal of graphs is given. Graphs are represented by linked lists. The language is syntactically defined as an extension to ALGOL 60, and it is translated into ALGOL by means of a syntax-driven compiler. Application areas for this language are operation research, network problems, control theory, traffic problems, etc.", 1629 acknowledgement = ack-nhfb, 1630 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", 1631 corpsource = "Politecnico di Milano, Italy", 1632 journalabr = "Commun ACM", 1633 keywords = "automatic control, analysis; computers; data handling; data structures; electric circuits, analysis; graph theory; operations research; procedure oriented languages", 1634} 1635 1636@Article{Laflin:1970:AAS, 1637 author = "S. Laflin and M. A. Brebner", 1638 title = "{ACM} Algorithm 380: In-situ Transposition of a Rectangular Matrix", 1639 journal = j-CACM, 1640 volume = "13", 1641 number = "5", 1642 pages = "324--326 (or 324--325??)", 1643 month = may, 1644 year = "1970", 1645 CODEN = "CACMA2", 1646 ISSN = "0001-0782", 1647 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1648 acknowledgement = ack-nhfb, 1649 classcodes = "C7300 (Natural sciences computing)", 1650 corpsource = "Univ. Birmingham, UK", 1651 keywords = "matrix algebra; subroutines", 1652} 1653 1654@Article{Knop:1970:AAR, 1655 author = "R. E. Knop", 1656 title = "{ACM} Algorithm 381: Random Vectors Uniform In Solid Angle", 1657 journal = j-CACM, 1658 volume = "13", 1659 number = "5", 1660 pages = "326--326", 1661 month = may, 1662 year = "1970", 1663 CODEN = "CACMA2", 1664 ISSN = "0001-0782", 1665 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1666 acknowledgement = ack-nhfb, 1667 classcodes = "C7890 (Other special applications of computing)", 1668 corpsource = "Rutgers Univ., New Brunswick, NJ, USA", 1669 keywords = "random number generation; subroutines", 1670} 1671 1672@Article{Elder:1970:FVI, 1673 author = "H. A. Elder", 1674 title = "On the Feasibility of Voice Input to an On-Line Computer Processing System", 1675 journal = j-CACM, 1676 volume = "13", 1677 number = "6", 1678 pages = "339--346", 1679 month = jun, 1680 year = "1970", 1681 CODEN = "CACMA2", 1682 ISSN = "0001-0782", 1683 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1684 bibsource = "Compendex database", 1685 abstract = "An on-line digital computer processing system is considered in which an ordinary telephone is the complete terminal device, input to the computer being provided as a sequence of spoken words, and output to the user being audio responses from the machine. The feasibility of implementing such a system with a FORTRAN-like algebraic compiler as the object processor is considered. Details of a specific word recognition program are given. This technique \ldots{} between each input word. Experimental results are presented giving error rates for different experimental conditions as well as the machine resources required to accommodate several users at a time. The results show that at this time it is both economically and logically feasible to handle at least 40 users at a time with an IBM 360\slash 65 computer.", 1686 acknowledgement = ack-nhfb, 1687 classcodes = "C5590 (Other computer peripheral equipment)", 1688 corpsource = "Cornell Univ., Ithaca, NY, USA", 1689 journalabr = "Commun ACM", 1690 keywords = "computer peripheral equipment; computers; computers, input-output device; computers, pattern recognition; data processing; man-machine interfaces; online operation; recognition; speech; speech, recognition; telephony; voice input", 1691} 1692 1693@Article{Muthukrishnan:1970:CDT, 1694 author = "C. R. Muthukrishnan and V. Rajaraman", 1695 title = "On the Conversion of Decision Tables to Computer Programs", 1696 journal = j-CACM, 1697 volume = "13", 1698 number = "6", 1699 pages = "347--351", 1700 month = jun, 1701 year = "1970", 1702 CODEN = "CACMA2", 1703 ISSN = "0001-0782", 1704 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1705 bibsource = "Compendex database", 1706 abstract = "The use of execution time diagnostics in pinpointing ambiguities in decision tables is discussed. It is pointed out that any attempt at resolving ambiguities at compile time will, in general, be impossible. It is shown that, as a consequence, three methods of converting decision tables to programs are inadequate in regard to ambiguity detection. Two algorithms for programming decision tables whose merits are simplicity of implementation and detection of ambiguities at execution time are presented. The first algorithm is for limited entry decision tables and clarifies the importance of proper coding of the information in the decision table. The second algorithm programs a mixed entry decision table directly without going through the intermediate step of conversion to a limited entry form, thereby resulting in storage economy. A comparison of the algorithms and others proposed in the literature is made. Some features of a decision table to FORTRAN IV translator developed for the IBM 7044 are given.", 1707 acknowledgement = ack-nhfb, 1708 classcodes = "C6100 (Software techniques and systems)", 1709 corpsource = "Indian Inst. Technol., Kanpur, India", 1710 journalabr = "Commun ACM", 1711 keywords = "computers; decision tables; operations research; programming", 1712} 1713 1714@Article{Grimes:1970:SRC, 1715 author = "J. E. Grimes", 1716 title = "Scheduling to Reduce Conflict in Meetings", 1717 journal = j-CACM, 1718 volume = "13", 1719 number = "6", 1720 pages = "351--352", 1721 month = jun, 1722 year = "1970", 1723 CODEN = "CACMA2", 1724 ISSN = "0001-0782", 1725 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1726 bibsource = "Compendex database", 1727 abstract = "Conflicts in scheduling can be treated as defining an undirected linear graph independently of the relation of the activities in conflict to additional constraints of time and space. Each connected component of such a graph, which can be found by an algorithm described by S. C. Gotlieb and D. C. Corneil, corresponds to a set of events that must be scheduled at different times. Applications are discussed in scheduling the presentation of papers at meetings and scheduling examinations.", 1728 acknowledgement = ack-nhfb, 1729 classcodes = "C1160 (Combinatorial mathematics)", 1730 corpsource = "Cornell Univ., Ithaca, NY, USA", 1731 journalabr = "Commun ACM", 1732 keywords = "co; computers; graph theory; programming; undirected linear graphs", 1733} 1734 1735@Article{Frantz:1970:PPA, 1736 author = "D. G. Frantz", 1737 title = "A {PL\slash} 1 program to assist the comparative linguist", 1738 journal = j-CACM, 1739 volume = "13", 1740 number = "6", 1741 pages = "353--356", 1742 month = jun, 1743 year = "1970", 1744 CODEN = "CACMA2", 1745 ISSN = "0001-0782", 1746 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1747 acknowledgement = ack-nhfb, 1748 classcodes = "C7820 (Humanities computing)", 1749 corpsource = "Univ. Alberta, Arrowwood, Alta., Canada", 1750 keywords = "language translation and linguistics", 1751} 1752 1753@Article{Damerau:1970:APC, 1754 author = "F. J. Damerau", 1755 title = "Automatic Parsing for Content Analysis", 1756 journal = j-CACM, 1757 volume = "13", 1758 number = "6", 1759 pages = "356--360", 1760 month = jun, 1761 year = "1970", 1762 CODEN = "CACMA2", 1763 ISSN = "0001-0782", 1764 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1765 bibsource = "Compendex database", 1766 abstract = "Although automatic syntactic and semantic analysis is not yet possible for all of an unrestricted natural language text, some applications, of which content analysis is one, do not have such a stringent coverage requirement. Preliminary studies show that the Harvard Syntactic Analyzer can produce correct and unambiguous identification of the subject and object of certain verbs for approximately half of the relevant occurrences. This provides a degree of coverage for content analysis variables which compares favorably to manual methods, in which only a sample of the total available text is normally processed.", 1767 acknowledgement = ack-nhfb, 1768 classcodes = "C7820 (Humanities computing)", 1769 corpsource = "IBM, Yorktown Heights, NY, USA", 1770 journalabr = "Commun ACM", 1771 keywords = "computers, data processing; content analysis; E L; information storage and retrie; language translation and linguistics; linguistics; natural language processing; syntactic analysis", 1772} 1773 1774@Article{Linz:1970:AFP, 1775 author = "Peter Linz", 1776 title = "Accurate Floating-Point Summation", 1777 journal = j-CACM, 1778 volume = "13", 1779 number = "6", 1780 pages = "361--362", 1781 month = jun, 1782 year = "1970", 1783 CODEN = "CACMA2", 1784 ISSN = "0001-0782", 1785 MRclass = "65.25", 1786 MRnumber = "44\#3468", 1787 mrreviewer = "R. P. Brent", 1788 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1789 bibsource = "Compendex database; garbo.uwasa.fi:/pc/doc-soft/fpbiblio.txt and ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1970.bib", 1790 abstract = "This paper describes an alternate method for summing a set of floating-point numbers. Comparison of the error bound for this method with that of the standard summation method shows that it is considerably less sensitive to propagation of round-off error.", 1791 acknowledgement = ack-nhfb, 1792 classcodes = "C5230 (Digital arithmetic methods)", 1793 corpsource = "New York Univ., NY, USA", 1794 descriptors = "Simulation; statistics; numeric calculation;", 1795 journalabr = "Commun ACM", 1796 keywords = "computers, data processing; floating point arithmetic; floating-point addition; mathematics; numerical methods; round-off error; round-off errors; round-off propagation; summation", 1797 keywords = "digital arithmetic", 1798} 1799 1800@Article{Hillstrom:1970:CSA, 1801 author = "K. E. Hillstrom", 1802 title = "Comparison of Several Adaptive Newton-Cotes Quadrature Routines in Evaluating Definite Integrals with Peaked Integrands", 1803 journal = j-CACM, 1804 volume = "13", 1805 number = "6", 1806 pages = "362--365", 1807 month = jun, 1808 year = "1970", 1809 CODEN = "CACMA2", 1810 ISSN = "0001-0782", 1811 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1812 bibsource = "Compendex database", 1813 abstract = "It is shown, by numerical experiment only, that there are certain quadratures for which the rate of convergences increases with the use of higher degree Newton-Cotes rules, used adaptively. The advantage of adaptive methods over a nonadaptive rule in approximating integrals having peaked integrands is demonstrated. The performance of five different adaptive quadrature schemes, based on Newton-Cotes (2N plus 1) point rules (N equals 1, 2, 3, 4, 5), in approximating a set of definite integrals is compared.", 1814 acknowledgement = ack-nhfb, 1815 classcodes = "C4160 (Numerical integration and differentiation)", 1816 corpsource = "Argonne Nat. Lab., IL, USA", 1817 journalabr = "Commun ACM", 1818 keywords = "computers, data processing; convergence of numerical methods; integral evaluation; integration; mathematics; methods; numerical; numerical integration; numerical methods; quadrature schemes", 1819} 1820 1821@Article{Stewart:1970:IOS, 1822 author = "G. W. Stewart", 1823 title = "Incorporating Origin Shifts into the {QR} Algorithm for Symmetric Tridiagonal Matrices", 1824 journal = j-CACM, 1825 volume = "13", 1826 number = "6", 1827 pages = "365--367", 1828 month = jun, 1829 year = "1970", 1830 CODEN = "CACMA2", 1831 ISSN = "0001-0782", 1832 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1833 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/gvl.bib and ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 1834 abstract = "The QR iteration for the eigenvalues of a symmetric tridiagonal matrix can be accelerated by incorporating a sequence of origin shifts. The origin shift may be either subtracted directly from the diagonal elements of the matrix or incorporated by means of an implicit algorithm. Both methods have drawbacks-the direct method can unnecessarily degrade small eigenvalues, while the implicit method can effectively loose the shift and thereby retard the convergence. A new method which has neither drawback is presented. Both the algorithm proposed here and the implicit algorithm are safer than the explicit algorithm. The implicit algorithm requires somewhat less computation, but the new algorithm will give faster convergence in some cases, an important consideration when eigenvectors are being calculated.", 1835 acknowledgement = ack-nhfb, 1836 classcodes = "C4140 (Linear algebra)", 1837 corpsource = "Univ. Tex., Austin, TX, USA", 1838 journalabr = "Commun ACM", 1839 keywords = "computers, data processing; convergence of numerical methods; eigenfunctions; eigenvalues; eigenvalues and; eigenvectors; iterative methods; mathematics; matrix algebra; origin shifts; QR method; symmetric tridiagonal matrix; tridiagonal matrices", 1840 kwds = "nla, eig, QR algorithm, symmetric matrix, tridiagonal matrix", 1841} 1842 1843@Article{Chase:1970:AAC, 1844 author = "P. J. Chase", 1845 title = "{ACM} Algorithm 382: Combinations of ${M}$ Out of ${N}$ Objects", 1846 journal = j-CACM, 1847 volume = "13", 1848 number = "6", 1849 pages = "368--368", 1850 month = jun, 1851 year = "1970", 1852 CODEN = "CACMA2", 1853 ISSN = "0001-0782", 1854 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1855 acknowledgement = ack-nhfb, 1856 classcodes = "C7300 (Natural sciences computing)", 1857 corpsource = "Dept. Defense, Fort Meade, MD, USA", 1858 keywords = "algebra; subroutines", 1859} 1860 1861@Article{Chase:1970:AAP, 1862 author = "P. J. Chase", 1863 title = "{ACM} Algorithm 383: Permutations of a Set with Repetitions", 1864 journal = j-CACM, 1865 volume = "13", 1866 number = "6", 1867 pages = "368--369", 1868 month = jun, 1869 year = "1970", 1870 CODEN = "CACMA2", 1871 ISSN = "0001-0782", 1872 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1873 acknowledgement = ack-nhfb, 1874 classcodes = "C7300 (Natural sciences computing)", 1875 corpsource = "Dept. Defense, Fort Meade, MD, USA", 1876 keywords = "algebra; subroutines", 1877} 1878 1879@Article{Stewart:1970:AAE, 1880 author = "G. W. Stewart", 1881 title = "{ACM} Algorithm 384: Eigenvalues and Eigenvectors of a Real Symmetric Matrix [{F2}]", 1882 journal = j-CACM, 1883 volume = "13", 1884 number = "6", 1885 pages = "369--371", 1886 month = jun, 1887 year = "1970", 1888 CODEN = "CACMA2", 1889 ISSN = "0001-0782", 1890 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1891 note = "See errata \cite{Stewart:1970:EAA}.", 1892 acknowledgement = ack-nhfb, 1893 classcodes = "C4140 (Linear algebra); C7300 (Natural sciences computing)", 1894 corpsource = "Univ. Texas, Austin, TX, USA", 1895 keywords = "eigenvalues; eigenvalues and eigenfunctions; eigenvectors; matrix algebra; QR algorithm; real symmetric matrix; subroutines", 1896 kwds = "nla, eig, QR algorithm, symmetric matrix", 1897} 1898 1899@Article{London:1970:CAM, 1900 author = "R. L. London", 1901 title = "Certification of Algorithm 245 ({M1}) Treesort 3: Proof of Algorithms --- {A} New Kind of Certification", 1902 journal = j-CACM, 1903 volume = "13", 1904 number = "6", 1905 pages = "371--374", 1906 month = jun, 1907 year = "1970", 1908 CODEN = "CACMA2", 1909 ISSN = "0001-0782", 1910 bibdate = "Fri Jan 17 18:26:39 1997", 1911} 1912 1913@Article{Chandler:1970:RS, 1914 author = "J. P. Chandler and W. C. Harrison", 1915 title = "{R201}--{SHELLSORT}", 1916 journal = j-CACM, 1917 volume = "13", 1918 number = "6", 1919 pages = "373--374", 1920 month = jun, 1921 year = "1970", 1922 CODEN = "CACMA2", 1923 ISSN = "0001-0782", 1924 bibdate = "Fri Jan 17 18:28:53 1997", 1925 keywords = "digital computer sorting; minimal storage sorting; sorting", 1926} 1927 1928@Article{Codd:1970:RMD, 1929 author = "E. F. Codd", 1930 title = "A Relational Model of Data for Large Shared Data Banks", 1931 journal = j-CACM, 1932 volume = "13", 1933 number = "6", 1934 pages = "377--387", 1935 month = jun, 1936 year = "1970", 1937 CODEN = "CACMA2", 1938 ISSN = "0001-0782", 1939 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1940 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib", 1941 note = "Also published in/as: `Readings in Database Systems', M. Stonebraker, Morgan-Kaufmann, 1988, pp. 5--15", 1942 abstract = "Future users of large data banks must be protected from having to know how the data is organized in the machine (the internal representation). A prompting service which supplies such information is not a satisfactory solution. Activities of users at terminals and most application programs would remain unaffected when the internal representation of data is changed and even when some aspects of the external representation are changed. Changes in data representation will often be needed as a result of changes in query, update, and report traffic and natural growth in the types of stored information. Existing noninferential, formatted data systems provide users with tree-structured files or slightly more general network models of the data. In Section 1, inadequacies of these models are discussed. A model based on $n$-ary relations, a normal form for data base relations, and the concept of a universal data sublanguage are introduced. In Section 2, certain operations on relations (other than logical inference) are discussed and applied to the problems of redundancy and consistency in the user's model.", 1943 acknowledgement = ack-nhfb, 1944 annote = "Shows problems of hierarchical data organization, presents a non-hierarchical `normal' structure, and discusses languages for describing relations of such normal structures.", 1945 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 1946 corpsource = "IBM, San Jose, CA, USA", 1947 journalabr = "Commun ACM", 1948 keywords = "composition; computers, data storage; consistency; data bank; data banks; data base; data integrity; data organization; data structure; data structures; derivability; file organisation; hierarchies of data; information retrieval; information storage and retrie; join; networks of data; NOI; predicate calculus; redundancy; relations; retrieval language; security; systems", 1949 review = "ACM CR 8905-0329", 1950} 1951 1952@Article{Grant:1970:ICG, 1953 author = "C. A. Grant", 1954 title = "An interactive command generating facility", 1955 journal = j-CACM, 1956 volume = "13", 1957 number = "7", 1958 pages = "403--406", 1959 month = jul, 1960 year = "1970", 1961 CODEN = "CACMA2", 1962 ISSN = "0001-0782", 1963 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1964 bibsource = "Compendex database", 1965 abstract = "A facility to permit conversationally controlled tasks to be executed in a noninteractive environment is proposed. A means by which programs can generate interactive time-sharing commands and receive the corresponding output response is presented. The commands will be invoked as if they had been typed at a console keyboard. It is argued that this facility will help overcome some of the current limitations in man-computer communication. A set of functions to accomplish the above which could be embedded into any string processing language is suggested, and necessary information pertinent to implementation of the facility on existing time-sharing systems is given.", 1966 acknowledgement = ack-nhfb, 1967 classcodes = "C6140B (Machine-oriented languages); C6150J (Operating systems)", 1968 corpsource = "Univ. California, Berkeley, CA, USA", 1969 journalabr = "Commun ACM", 1970 keywords = "computers; computers, time sharing; interactive computing; machine oriented languages; operating systems; time-sharing systems", 1971} 1972 1973@Article{Wilkes:1970:CAM, 1974 author = "M. A. Wilkes", 1975 title = "Conversational Access to a 2048-Word Machine", 1976 journal = j-CACM, 1977 volume = "13", 1978 number = "7", 1979 pages = "407--414", 1980 month = jul, 1981 year = "1970", 1982 CODEN = "CACMA2", 1983 ISSN = "0001-0782", 1984 bibdate = "Tue Mar 25 13:26:09 MST 1997", 1985 bibsource = "Compendex database", 1986 abstract = "LAP6 is an on-line system running on 2048- word LINC which provides full facilities for text editing, automatic filing and file maintenance, and program preparation and assembly. It focuses on the preparation and editing of continuously displayed 23,040- character text strings (manuscripts) which can be positioned anywhere by the user and edited by simply adding and deleting lines as though working directly on an elastic scroll. Other features are available through a uniform command set which itself can be augmented by the user. The machine, although small, aids program design by providing display scope and premarked randomly addressable LINC tapes as standard items, in an environment similar to that of a sophisticated terminal. The tapes are logically similar to a disk. Priority was given to the design of efficient tape algorithms to minimize the limitations of the small memory. Techniques developed for handling scroll editing, filing, and the layered system structure are outlined.", 1987 acknowledgement = ack-nhfb, 1988 classcodes = "C6150J (Operating systems)", 1989 corpsource = "Washington Univ., St. Louis, MS, USA", 1990 journalabr = "Commun ACM", 1991 keywords = "computers; interactive computing; OD; online operation; operating systems; operating systems (computers); text editing", 1992} 1993 1994@Article{Waite:1970:MPS, 1995 author = "W. M. Waite", 1996 title = "The mobile programming system: {STAGE} 2", 1997 journal = j-CACM, 1998 volume = "13", 1999 number = "7", 2000 pages = "415--421", 2001 month = jul, 2002 year = "1970", 2003 CODEN = "CACMA2", 2004 ISSN = "0001-0782", 2005 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2006 bibsource = "Compendex database", 2007 abstract = "STAGE 2 is the second level of a bootstrap sequence which is easily implemented on any computer. It is a flexible, powerful macro processor designed specifically as a tool for constructing machine-independent software. The features provided by STAGE 2 are summarized, and the implementation techniques which have made it possible to have STAGE 2 running on a new machine with less than one man-week of effort are discussed. The approach has been successful on over 15 machines of widely varying characteristics.", 2008 acknowledgement = ack-nhfb, 2009 classcodes = "C6140E (Other programming languages)", 2010 corpsource = "Univ. Colorado, Boulder, CO, USA", 2011 journalabr = "Commun ACM", 2012 keywords = "bootstrapping; computers; macro processors; programming languages; system", 2013} 2014 2015@Article{Bloom:1970:STT, 2016 author = "Burton H. Bloom", 2017 title = "Space\slash Time Trade-offs in Hash Coding with Allowable Errors", 2018 journal = j-CACM, 2019 volume = "13", 2020 number = "7", 2021 pages = "422--426", 2022 month = jul, 2023 year = "1970", 2024 CODEN = "CACMA2", 2025 ISSN = "0001-0782", 2026 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2027 bibsource = "Compendex database", 2028 abstract = "Trade-offs among certain computational factors in hash coding are analyzed. The paradigm problem considered is that of testing a series of messages one-by-one for membership in a given set of messages. Two new hash-coding methods are examined and compared with a particular conventional hash-coding method. The computational factors considered are the size of the hash area (space), the time required to identify a message as a nonmember of the given set (reject time), and an allowable error frequency. The new methods are intended to reduce the amount of space required to contain the hash-coded information from that associated with conventional methods. The reduction in space is accomplished by exploiting the possibility that a small fraction of errors of commission may be tolerable in some applications, in particular, applications in which a large amount of data is involved and a core resident hash area is consequently not feasible using conventional methods. An example is discussed which illustrates possible areas of application for the new method.", 2029 acknowledgement = ack-nhfb, 2030 annote = "Phantom use of a direct access list.", 2031 classcodes = "C6130 (Data handling techniques)", 2032 corpsource = "Computer Usage Co. Newton Upper Falls, MA, USA", 2033 journalabr = "Commun ACM", 2034 keywords = "bit vector filter CACM; codes; computers; computers, errors; hash coding; inf", 2035} 2036 2037@Article{Coffman:1970:FSU, 2038 author = "E. G. {Coffman, Jr.} and J. Eve", 2039 title = "File Structures Using Hashing Functions", 2040 journal = j-CACM, 2041 volume = "13", 2042 number = "7", 2043 pages = "427--432, 436", 2044 month = jul, 2045 year = "1970", 2046 CODEN = "CACMA2", 2047 ISSN = "0001-0782", 2048 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2049 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 2050 abstract = "A general method of file structuring is proposed which uses a hashing function to define tree structure. Two types of such trees are examined, and their relation to trees studied in the past is explained. Results for the probability distributions of path lengths are derived and illustrated.", 2051 acknowledgement = ack-nhfb, 2052 annote = "Tree structure with branching based on bit values of key code.", 2053 classcodes = "C6120 (File organisation)", 2054 corpsource = "Univ. Newcastle upon Tyne, UK", 2055 journalabr = "Commun ACM", 2056 keywords = "computers; data processing; data structures; file organization; hash coding; information storage and retrie; tree structures; trees (mathematics)", 2057} 2058 2059@Article{Bradley:1970:ABG, 2060 author = "Gordon H. Bradley", 2061 title = "Algorithm and Bound for the Greatest Common Divisor of $n$ Integers", 2062 journal = j-CACM, 2063 volume = "13", 2064 number = "7", 2065 pages = "433--436", 2066 month = jul, 2067 year = "1970", 2068 CODEN = "CACMA2", 2069 ISSN = "0001-0782", 2070 MRclass = "10A30", 2071 MRnumber = "45 3313", 2072 mrreviewer = "A. M. Cohen", 2073 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2074 bibsource = "Compendex database", 2075 abstract = "A new version of the Euclidean algorithm for finding the greatest common divisor of $n$ integers $a(i)$ and multipliers $x(i)$ such that $\mbox{gcd} = x(1)a(1) + \ldots + x(n)a(n)$ is presented. The number of arithmetic operations and the number of storage locations are linear in $n$. A theorem of Lame that gives a bound for the number of iterations of the Euclidean algorithm for two integers is extended to the case of $n$ integers. An algorithm to construct a minimal set of multipliers is presented. A Fortran program for the algorithm appears as Comm. ACM Algorithm 386.", 2076 acknowledgement = ack-nhfb, 2077 classcodes = "C4190 (Other numerical methods)", 2078 corpsource = "Yale Univ., New Haven, CT, USA", 2079 journalabr = "Commun ACM", 2080 keywords = "computers, data processing; diophantine equations; Euclidean algorithm; greatest common divisor; iterative methods; mathematics; number theory; numerical methods", 2081} 2082 2083@Article{Woods:1970:CSP, 2084 author = "W. A. Woods", 2085 title = "Context-Sensitive Parsing", 2086 journal = j-CACM, 2087 volume = "13", 2088 number = "7", 2089 pages = "437--445", 2090 month = jul, 2091 year = "1970", 2092 CODEN = "CACMA2", 2093 ISSN = "0001-0782", 2094 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2095 bibsource = "Compendex database", 2096 abstract = "This paper presents a canonical form for context-sensitive derivations and a parsing algorithm which finds each context-sensitive analysis once and only once. The amount of memory required by the algorithm is essentially no more than the required to store a single complete derivation. In addition, a modified version of the basic algorithm is presented which blocks infinite analyses for grammars which contain loops. The algorithm is also compared with several previous parsers for context-sensitive grammars and general rewriting systems, and the difference between the two types of analyses is discussed. The algorithm appears to be complementary to an algorithm by S. Kuno in several respects, including the space-time trade-off and the degree of context dependence involved.", 2097 acknowledgement = ack-nhfb, 2098 classcodes = "C4210 (Formal logic)", 2099 corpsource = "Harvard Univ., Cambridge, MA, USA", 2100 journalabr = "Commun ACM", 2101 keywords = "computational linguistics", 2102 keywords = "automata theory; computational linguistics; context-sensitive grammars; context-sensitive parsing; formal grammars; formal language theory; parsing; parsing algorithms; recognition algorithms", 2103} 2104 2105@Article{Paciorek:1970:AAE, 2106 author = "K. A. Paciorek", 2107 title = "{ACM} Algorithm 385: Exponential Integral ${E}_i(x)$", 2108 journal = j-CACM, 2109 volume = "13", 2110 number = "7", 2111 pages = "446--447", 2112 month = jul, 2113 year = "1970", 2114 CODEN = "CACMA2", 2115 ISSN = "0001-0782", 2116 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2117 acknowledgement = ack-nhfb, 2118 classcodes = "C4160 (Numerical integration and differentiation); C7300 (Natural sciences computing)", 2119 corpsource = "Argonne Nat. Lab., IL, USA", 2120 keywords = "integration; subroutines", 2121} 2122 2123@Article{Bradley:1970:AAG, 2124 author = "G. H. Bradley", 2125 title = "{ACM} Algorithm 386: Greatest Common Divisor of $n$ Integers and Multipliers", 2126 journal = j-CACM, 2127 volume = "13", 2128 number = "7", 2129 pages = "447--448", 2130 month = jul, 2131 year = "1970", 2132 CODEN = "CACMA2", 2133 ISSN = "0001-0782", 2134 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2135 acknowledgement = ack-nhfb, 2136 classcodes = "C4190 (Other numerical methods); C7300 (Natural sciences computing)", 2137 corpsource = "Yale Univ. New Haven, CT, USA", 2138 keywords = "number theory; subroutines", 2139} 2140 2141@Article{Sattley:1970:CPL, 2142 author = "K. Sattley and R. Millstein", 2143 title = "Comments on a paper by {Lowe}", 2144 journal = j-CACM, 2145 volume = "13", 2146 number = "7", 2147 pages = "450--451", 2148 month = jul, 2149 year = "1970", 2150 CODEN = "CACMA2", 2151 ISSN = "0001-0782", 2152 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2153 acknowledgement = ack-nhfb, 2154 classcodes = "C4290 (Other computer theory)", 2155 corpsource = "Applied Data Res. Inc., NY, USA", 2156 keywords = "computation theory; graph theory", 2157} 2158 2159@Article{Baecker:1970:NDB, 2160 author = "H. D. Baecker", 2161 title = "A note on data base deadlocks", 2162 journal = j-CACM, 2163 volume = "13", 2164 number = "7", 2165 pages = "451--451", 2166 month = jul, 2167 year = "1970", 2168 CODEN = "CACMA2", 2169 ISSN = "0001-0782", 2170 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2171 acknowledgement = ack-nhfb, 2172 classcodes = "C7250 (Information storage and retrieval)", 2173 corpsource = "Univ. Calgary, Alta., Canada", 2174 keywords = "information retrieval", 2175} 2176 2177@Article{Pomeranz:1970:NAP, 2178 author = "J. E. Pomeranz", 2179 title = "Note on an Anomaly in Paging", 2180 journal = j-CACM, 2181 volume = "13", 2182 number = "7", 2183 pages = "451--451", 2184 month = jul, 2185 year = "1970", 2186 CODEN = "CACMA2", 2187 ISSN = "0001-0782", 2188 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2189 acknowledgement = ack-nhfb, 2190 classcodes = "C6120 (File organisation)", 2191 corpsource = "Univ. Chicago, IL, USA", 2192 keywords = "demand paging; paging machines; replacement algorithm; storage allocation", 2193} 2194 2195@Article{Hunt:1970:CAA, 2196 author = "B. R. Hunt", 2197 title = "A Comment on Axiomatic Approaches to Programming", 2198 journal = j-CACM, 2199 volume = "13", 2200 number = "7", 2201 pages = "452--452", 2202 month = jul, 2203 year = "1970", 2204 CODEN = "CACMA2", 2205 ISSN = "0001-0782", 2206 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2207 acknowledgement = ack-nhfb, 2208 classcodes = "C4290 (Other computer theory)", 2209 corpsource = "Univ. California, Los Alamos, NM, USA", 2210 keywords = "axiomatic method; computability and decidability; homomorphic structure in programming; programming; proofs of programs", 2211} 2212 2213@Article{Nielsen:1970:ACR, 2214 author = "N. R. Nielsen", 2215 title = "Allocation of Computer Resources. is Pricing the Answer", 2216 journal = j-CACM, 2217 volume = "13", 2218 number = "8", 2219 pages = "467--474", 2220 month = aug, 2221 year = "1970", 2222 CODEN = "CACMA2", 2223 ISSN = "0001-0782", 2224 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2225 bibsource = "Compendex database", 2226 abstract = "The extent to which a pricing mechanism fits the mold is discussed. Inasmuch as pricing must serve as a rationing mechanism at times, consideration is given to the means by which prices can be adjusted flexibly in order to make a dynamic allocation of resources. Consideration is given to the means by which users can be insulated from the harmful effects of frequent price fluctuations. Two illustrative pricing systems are discussed in order to demonstrate the applicability of pricing in quite different environments.", 2227 acknowledgement = ack-nhfb, 2228 classcodes = "C0200 (General computer topics)", 2229 corpsource = "Stanford Univ., CA, USA", 2230 journalabr = "Commun ACM", 2231 keywords = "CACMA; computers; cost accounting; digital computers; economics; industrial management; installation management; resource allocation; resources", 2232} 2233 2234@Article{Nagy:1970:NTH, 2235 author = "G. Nagy and N. Tuong", 2236 title = "Normalization Techniques for Handprinted Numerals", 2237 journal = j-CACM, 2238 volume = "13", 2239 number = "8", 2240 pages = "475--481", 2241 month = aug, 2242 year = "1970", 2243 CODEN = "CACMA2", 2244 ISSN = "0001-0782", 2245 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2246 bibsource = "Compendex database", 2247 abstract = "A family of pattern standardization techniques based on geometrical projection is applied to a file of digitized handprinted numerals obtained from sales clerks. The principle involves transforming a quadrilateral specified in terms of the convex hull of each pattern into a square. The amount of overlap within each class of characters vs the amount between classes is used to evaluate the degree of normalization achieved with respect to other published methods including size and shear normalization through moments.", 2248 acknowledgement = ack-nhfb, 2249 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 2250 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 2251 journalabr = "Commun ACM", 2252 keywords = "CACMA; computers digital, character R; computers, digital; pattern recognition; pattern recognition systems", 2253} 2254 2255@Article{Day:1970:FTQ, 2256 author = "A. C. Day", 2257 title = "Full Table Quadratic Searching for Scatter Storage", 2258 journal = j-CACM, 2259 volume = "13", 2260 number = "8", 2261 pages = "481--482", 2262 month = aug, 2263 year = "1970", 2264 CODEN = "CACMA2", 2265 ISSN = "0001-0782", 2266 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2267 bibsource = "Compendex database", 2268 abstract = "The quadratic residue search method for hash tables avoids much of the clustering experienced with a linear search method. The simple quadratic search only accesses half the table. It has been shown that when the length of the table is a prime of the form 4n plus 3, where n is an integer, the whole table may be accessed by two quadratic searches plus a separate access for the original entry point. A search method is presented which is computationally simple, has all the advantages of the quadratic search, and yet accesses all the table in one sweep.", 2269 acknowledgement = ack-nhfb, 2270 classcodes = "C6130 (Data handling techniques)", 2271 corpsource = "Univ. Coll. London, UK", 2272 journalabr = "Commun ACM", 2273 keywords = "CACMA; computers; computers, data storage; hash coding; programming; table look-up; table lookup", 2274} 2275 2276@Article{Brawn:1970:SPE, 2277 author = "B. S. Brawn and F. G. Gustavson and E. S. Mankin", 2278 title = "Sorting in a Paging Environment", 2279 journal = j-CACM, 2280 volume = "13", 2281 number = "8", 2282 pages = "483--494", 2283 month = aug, 2284 year = "1970", 2285 CODEN = "CACMA2", 2286 ISSN = "0001-0782", 2287 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2288 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 2289 abstract = "This sorting study was part of an extensive measurement project undertaken on the M44\slash 44X, an experimental paging system which was conceived and implemented at IBM Research in order to explore the virtual machine concept. The study was concerned with the implementation of sorting procedures in the context of the dynamic paging environment characteristic of virtual memory machines. Descriptions of the experimental sort programs and analysis of the performance measurement results obtained for them are presented. The insight gained from the experimental effort is used to arrive at a set of broad guidelines for writing sort programs for a paging environment.", 2290 acknowledgement = ack-nhfb, 2291 classcodes = "C6130 (Data handling techniques)", 2292 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 2293 journalabr = "Commun ACM", 2294 keywords = "CACMA; computer, memories; computers; computers, programming; dynamic memory management; External sort virtual memory CACM; operating systems; sorting; virtual machines", 2295} 2296 2297@Article{Saltzer:1970:IM, 2298 author = "J. H. Saltzer and J. W. Gintell", 2299 title = "The instrumentation of {Multics}", 2300 journal = j-CACM, 2301 volume = "13", 2302 number = "8", 2303 pages = "495--500", 2304 month = aug, 2305 year = "1970", 2306 CODEN = "CACMA2", 2307 ISSN = "0001-0782", 2308 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2309 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/monitor.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 2310 abstract = "An array of measuring tools devised to aid in the implementation of a prototype computer utility is discussed. These tools include special hardware clocks and data channels, general purpose programmed probing and recording tools, and specialized measurement facilities. Some particular measurements of interest in a system which combines demand paging with multiprogramming are described in detail. Measuring techniques described here have been directed primarily toward understanding what goes on inside the operating system, rather than on measuring `throughput' system capacity, or the characteristics of system load.", 2311 acknowledgement = ack-nhfb, 2312 annote = "An array of measuring tools devised to aid in the implementation of a prototype computer utility is discussed. These tools include (1) a hardware calendar clock (52 bit, 1 microsecond resolution) and an associated match register; (2) a memory reference counter; (3) an input/output channel which can be used by an attached processor to read memory; (4) a general metering package which records time spent executing selectable supervisor modules while the system is running; (5) a segment utilization metering facility which periodically probes for the current segment number; (6) a facility which records on a per-segment basis the number of missing pages and segments encountered during execution in that segment; (7) a tool which counts the number of times procedures are called; (8) a software package implemented on a PDP-8 which utilizes the special I/O channel (3); (9) the CLI, which prints out the time of day, the CPU time, and the number of times the process had to wait for a page to be brought in after every `ready message'; (10) a ring buffer containing the segment, page number, and time of day of the last 256 missing pages of the process under measurement; (11) a package to monitor the effect of the system's multiprogramming effort of an individual program; (12) a script driver implemented on a PDP-8; and (13) an internal script driver.", 2313 classcodes = "C6150J (Operating systems)", 2314 corpsource = "MIT, Cambridge, MA, USA", 2315 journalabr = "Commun ACM", 2316 keywords = "CACMA; computers; multiprogramming systems; operating distributed performance paging CACM; operating systems; operating systems (computers); performance measurement; system analysis", 2317} 2318 2319@Article{Ichbiah:1970:TGA, 2320 author = "J. D. Ichbiah and S. P. Morse", 2321 title = "A technique for generating almost optimal {Floyd-Evans} productions for precedence grammars", 2322 journal = j-CACM, 2323 volume = "13", 2324 number = "8", 2325 pages = "501--508", 2326 month = aug, 2327 year = "1970", 2328 CODEN = "CACMA2", 2329 ISSN = "0001-0782", 2330 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2331 acknowledgement = ack-nhfb, 2332 classcodes = "C4210 (Formal logic)", 2333 corpsource = "Co. Internat. l'Informatique, Les Clayes-sous-Bois, France", 2334 keywords = "computational linguistics; grammars; optimisation", 2335} 2336 2337@Article{Fielding:1970:AAF, 2338 author = "K. Fielding", 2339 title = "{ACM} Algorithm 387: Function Minimization and Linear Search", 2340 journal = j-CACM, 2341 volume = "13", 2342 number = "8", 2343 pages = "509--510", 2344 month = aug, 2345 year = "1970", 2346 CODEN = "CACMA2", 2347 ISSN = "0001-0782", 2348 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2349 acknowledgement = ack-nhfb, 2350 classcodes = "C7300 (Natural sciences computing)", 2351 corpsource = "Univ. Essex, Wivenhoe Park, Colchester, UK", 2352 keywords = "optimisation; subroutines", 2353} 2354 2355@Article{Hubner:1970:AAR, 2356 author = "H. H{\"{u}}bner and H. Kremer and K. O. Linn and W. Schwering", 2357 title = "{ACM} Algorithm 388: {Rademacher} Function", 2358 journal = j-CACM, 2359 volume = "13", 2360 number = "8", 2361 pages = "510--511", 2362 month = aug, 2363 year = "1970", 2364 CODEN = "CACMA2", 2365 ISSN = "0001-0782", 2366 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2367 acknowledgement = ack-nhfb, 2368 classcodes = "C7300 (Natural sciences computing)", 2369 keywords = "mathematics; subroutines", 2370} 2371 2372@Article{Hubner:1970:AAB, 2373 author = "H. H{\"{u}}bner and H. Kremer and K. O. Linn and W. Schwering", 2374 title = "{ACM} Algorithm 389: Binary Ordered {Walsh} Functions", 2375 journal = j-CACM, 2376 volume = "13", 2377 number = "8", 2378 pages = "511--511", 2379 month = aug, 2380 year = "1970", 2381 CODEN = "CACMA2", 2382 ISSN = "0001-0782", 2383 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2384 acknowledgement = ack-nhfb, 2385 classcodes = "C7300 (Natural sciences computing)", 2386 keywords = "mathematics; subroutines", 2387} 2388 2389@Article{Hubner:1970:AAS, 2390 author = "H. H{\"{u}}bner and H. Kremer and K. O. Linn and W. Schwering", 2391 title = "{ACM} Algorithm 390: Sequency Ordered {Walsh} Functions", 2392 journal = j-CACM, 2393 volume = "13", 2394 number = "8", 2395 pages = "511--512 (or 511--511??)", 2396 month = aug, 2397 year = "1970", 2398 CODEN = "CACMA2", 2399 ISSN = "0001-0782", 2400 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2401 acknowledgement = ack-nhfb, 2402 classcodes = "C7300 (Natural sciences computing)", 2403 keywords = "mathematics; subroutines", 2404} 2405 2406@Article{McKay:1970:AAU, 2407 author = "J. McKay", 2408 title = "{ACM} Algorithm 391: Unitary Symmetric Polynomials", 2409 journal = j-CACM, 2410 volume = "13", 2411 number = "8", 2412 pages = "512--512", 2413 month = aug, 2414 year = "1970", 2415 CODEN = "CACMA2", 2416 ISSN = "0001-0782", 2417 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2418 acknowledgement = ack-nhfb, 2419 classcodes = "C7300 (Natural sciences computing)", 2420 corpsource = "California Inst. Technol., Pasadena, CA, USA", 2421 keywords = "polynomials; subroutines", 2422} 2423 2424@Article{Anonymous:1970:ISU, 2425 author = "Anonymous", 2426 title = "Identification of {States of the United States} (including the {District of Columbia}) for information interchange", 2427 journal = j-CACM, 2428 volume = "13", 2429 number = "8", 2430 pages = "514--515", 2431 month = aug, 2432 year = "1970", 2433 CODEN = "CACMA2", 2434 ISSN = "0001-0782", 2435 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2436 acknowledgement = ack-nhfb, 2437 classcodes = "C6130 (Data handling techniques)", 2438 keywords = "code standards", 2439} 2440 2441@Article{Bouknight:1970:PGT, 2442 author = "W. Jack Bouknight", 2443 title = "A Procedure for Generation of Three-Dimensional Half-Toned Computer Graphics Presentations", 2444 journal = j-CACM, 2445 volume = "13", 2446 number = "9", 2447 pages = "527--536", 2448 month = sep, 2449 year = "1970", 2450 CODEN = "CACMA2", 2451 ISSN = "0001-0782", 2452 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2453 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/pre75.bib", 2454 abstract = "A description is given of an algorithm for producing computer generated halftone presentations of three-dimensional polygonal surface structures. The history leading to the algorithm development and then the algorithm itself are described. Results are presented and are compared with computer runs achieved by the Warnock approach. An extension of the procedure to variable position illumination sources is also given.", 2455 acknowledgement = ack-nhfb, 2456 classcodes = "C4190 (Other numerical methods)", 2457 corpsource = "Univ. Illinois, Urbana, IL, USA", 2458 journalabr = "Commun ACM", 2459 keywords = "CACMA; computer graphics; computers; half-tone images; hidden surface; image processing", 2460} 2461 2462@Article{Bracchi:1970:ISS, 2463 author = "G. Bracchi and M. Somalvico", 2464 title = "Interactive Software System for Computer-Aided Design. an Application to Circuit Project", 2465 journal = j-CACM, 2466 volume = "13", 2467 number = "9", 2468 pages = "537--545", 2469 month = sep, 2470 year = "1970", 2471 CODEN = "CACMA2", 2472 ISSN = "0001-0782", 2473 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2474 bibsource = "Compendex database", 2475 abstract = "Characteristics of an interactive software system, intended to constitute an interface between designer and computer during various steps of the design process, are presented. Main emphasis is given to the description of the features of the two high level user oriented languages, operating at different levels, on which the interaction is based. The first one is IMOL, an interactive monitor language, which is designed to perform the overall and control functions of the software system. The second one is COIF, a circuit oriented graphic language, which is designed to describe, generate, and manipulate graphic problem specifications. The application to computer-aided circuit design is in particular examined.", 2476 acknowledgement = ack-nhfb, 2477 classcodes = "B1130B (Computer-aided circuit analysis and design); C7410D (Electronic engineering computing)", 2478 corpsource = "Politecnico, Milano, Italy", 2479 journalabr = "Commun ACM", 2480 keywords = "CACMA; computer aided circuit design; computer-aided circuit design; computers; computers, graphics; computers, programming; electric circuits, analysis; language; online operation", 2481} 2482 2483@Article{Hirschsohn:1970:AHL, 2484 author = "I. Hirschsohn", 2485 title = "{AMESPLOT}, a Higher Level Data Plotting Software System", 2486 journal = j-CACM, 2487 volume = "13", 2488 number = "9", 2489 pages = "546--555", 2490 month = sep, 2491 year = "1970", 2492 CODEN = "CACMA2", 2493 ISSN = "0001-0782", 2494 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2495 bibsource = "Compendex database", 2496 abstract = "System described is hardware independent. Elements common to all types of data plots are outlined and the way in which these elements may be combined into a system based on simple modules is demonstrated. Basic syntax of AMESPLOT is outlined, and a brief description is given of its current utility software, consisting of `macros' to produce self-scaled plots, formal tablets of text, interspersed with subplots, map coastlines and 3-D plots. Structuring of plots from multiple, independent, self-contained subplots is described.", 2497 acknowledgement = ack-nhfb, 2498 classcodes = "C6140D (High level languages)", 2499 corpsource = "Univ. California, San Diego, La Jolla, CA, USA", 2500 journalabr = "Commun ACM", 2501 keywords = "CACMA; computer graphics; computers; computers, language; data plotting; graphics; interactive computing; problem oriented languages", 2502} 2503 2504@Article{Moler:1970:ISR, 2505 author = "Cleve B. Moler and Louis P. Solomon", 2506 title = "Integrating Square Roots", 2507 journal = j-CACM, 2508 volume = "13", 2509 number = "9", 2510 pages = "556--557", 2511 month = sep, 2512 year = "1970", 2513 CODEN = "CACMA2", 2514 ISSN = "0001-0782", 2515 MRclass = "65.60", 2516 MRnumber = "44\#1223", 2517 mrreviewer = "J. C. Butcher", 2518 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2519 bibsource = "Compendex database", 2520 abstract = "Differential equation of the $(y')^2 = f(y)$ are difficult to integrate numerically because of the singularity at points where $f(y)$ vanishes. A technique is described for removing the singularity and evaluating the expressions through the use of standard numerical methods for second order ordinary differential equations.", 2521 acknowledgement = ack-nhfb, 2522 classcodes = "C4170 (Differential equations)", 2523 corpsource = "Univ. Michigan, Ann Arbor, MI, USA", 2524 journalabr = "Commun ACM", 2525 keywords = "CACMA; differential equations; mathematics; numerical methods; quadrature; Y F", 2526} 2527 2528@Article{Kimble:1970:VGL, 2529 author = "G. W. Kimble", 2530 title = "A Variation of the {Goodman-Lance} Method for the Solution of Two-Point Boundary Value Problems", 2531 journal = j-CACM, 2532 volume = "13", 2533 number = "9", 2534 pages = "557--558", 2535 month = sep, 2536 year = "1970", 2537 CODEN = "CACMA2", 2538 ISSN = "0001-0782", 2539 MRclass = "65.62", 2540 MRnumber = "44\#3500", 2541 mrreviewer = "F. Odeh", 2542 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2543 bibsource = "Compendex database", 2544 abstract = "A recently published method for the interpolative solution of nonlinear equations is improved, and applied to give a significant variation of the Goodman-Lance method for the solution of two-point boundary value problems. The resulting method applies in particular to the numerical solution of optimal control problems in the Euler-Lagrange formulation. Quantitative estimates are presented which indicate that the variation is nearly twice as fast on some problems in the latter context.", 2545 acknowledgement = ack-nhfb, 2546 classcodes = "C4170 (Differential equations)", 2547 corpsource = "Univ. Nevada, Reno, NV, USA", 2548 journalabr = "Commun ACM", 2549 keywords = "automatic control; boundary value problems; boundary-value problems; CACMA; differential equations; Goodman-Lance; interpolative solution; Newton's method; nonlinear equations; numerical methods; optimal control; optimization; ordinary differential equations; orthogonal matrices; secant method", 2550 keywords = "boundary-value problems; differential equations", 2551} 2552 2553@Article{Wilson:1970:OSA, 2554 author = "M. Wayne Wilson", 2555 title = "Optimal Starting Approximations for Generating Square Root for Slow or No Divide", 2556 journal = j-CACM, 2557 volume = "13", 2558 number = "9", 2559 pages = "559--561 (or 559--560??)", 2560 month = sep, 2561 year = "1970", 2562 CODEN = "CACMA2", 2563 ISSN = "0001-0782", 2564 MRclass = "65.50", 2565 MRnumber = "44\#2338", 2566 mrreviewer = "J. E. {Dennis, Jr.}", 2567 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2568 bibsource = "Compendex database; garbo.uwasa.fi:/pc/doc-soft/fpbiblio.txt", 2569 abstract = "On computing machines with slow or no division, it is preferable to use an iterative scheme for the square root different from the classical Heron scheme. The problem of optimal initial approximants is considered, and some optimal polynomial initial approximations are tabulated.", 2570 acknowledgement = ack-nhfb, 2571 classcodes = "C5230 (Digital arithmetic methods)", 2572 corpsource = "IBM, Houston, TX, USA", 2573 journalabr = "Commun ACM", 2574 keywords = "CACMA; digital arithmetic; ele; iterative methods; mathematics; numerical methods; optimisation", 2575} 2576 2577@Article{Ehrlich:1970:CMI, 2578 author = "L. W. Ehrlich", 2579 title = "Complex Matrix Inversion Versus Real", 2580 journal = j-CACM, 2581 volume = "13", 2582 number = "9", 2583 pages = "561--562", 2584 month = sep, 2585 year = "1970", 2586 CODEN = "CACMA2", 2587 ISSN = "0001-0782", 2588 MRclass = "65.35", 2589 MRnumber = "44\#1196", 2590 mrreviewer = "C. G. Cullen", 2591 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2592 bibsource = "Compendex database", 2593 abstract = "A comparison of complex matrix with real matrix inversion is made. It is shown that the complex inversion can be up to twice as fast as the real inversion. Further, the rounding error bound for complex inversion is about one-eighth that of real, for Gaussian elimination. Using extended inner product accumulation the bound is half of the real system.", 2594 acknowledgement = ack-nhfb, 2595 classcodes = "C4140 (Linear algebra)", 2596 corpsource = "Johns Hopkins Univ., Silver Spring, MD, USA", 2597 journalabr = "Commun ACM", 2598 keywords = "CACMA; complex matrix inversion; complex rounding error bounds; error bounds; GUL; inversion; mathematics; matrix algebra; matrix inversion; numerical methods; rounding error bound; rounding errors", 2599} 2600 2601@Article{vanEmden:1970:IEQ, 2602 author = "M. H. {van Emden}", 2603 title = "Increasing the Efficiency of Quicksort", 2604 journal = j-CACM, 2605 volume = "13", 2606 number = "9", 2607 pages = "563--567 (or 563--566??)", 2608 month = sep, 2609 year = "1970", 2610 CODEN = "CACMA2", 2611 ISSN = "0001-0782", 2612 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2613 bibsource = "Compendex database", 2614 abstract = "The average asymptotic number of comparisons needed is shown to be $! n log_2 (n)$. A formula is derived expressing $!$ in terms of the probability distribution of the `bound' of a partition. Another generalization of quicksort is presented which uses a bounding interval instead of a single element as bound. This generalization turns out to be easy to implement in a computer program. A numerical approximation shows that $!$ equals 1.140 for this version of quicksort compared with 1.386 for the original. This implies a decrease in number of comparisons of 18\%; actual tests showed about 15\% saving in computing time.", 2615 acknowledgement = ack-nhfb, 2616 classcodes = "C6130 (Data handling techniques)", 2617 corpsource = "Math. Centre, Amsterdam, Netherlands", 2618 journalabr = "Commun ACM", 2619 keywords = "CACMA; computers; programming; SAL; sorting", 2620} 2621 2622@Article{Smith:1970:AAS, 2623 author = "Robert R. Smith and Dennis McCall", 2624 title = "{ACM} Algorithm 392: Systems of Hyperbolic {P.D.E.}", 2625 journal = j-CACM, 2626 volume = "13", 2627 number = "9", 2628 pages = "567--570", 2629 month = sep, 2630 year = "1970", 2631 CODEN = "CACMA2", 2632 ISSN = "0001-0782", 2633 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2634 acknowledgement = ack-nhfb, 2635 classcodes = "C4170 (Differential equations); C7310 (Mathematics computing)", 2636 corpsource = "US Naval Electronics Lab. Center, San Diego, CA, USA", 2637 keywords = "boundary-value problems; partial differential equations", 2638} 2639 2640@Article{Abdali:1970:AAS, 2641 author = "S. K. Abdali", 2642 title = "{ACM} Algorithm 393: Special Series Summation with Arbitrary Precision", 2643 journal = j-CACM, 2644 volume = "13", 2645 number = "9", 2646 pages = "570--570", 2647 month = sep, 2648 year = "1970", 2649 CODEN = "CACMA2", 2650 ISSN = "0001-0782", 2651 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2652 acknowledgement = ack-nhfb, 2653 classcodes = "C4120 (Functional analysis); C7310 (Mathematics computing)", 2654 corpsource = "Univ. Wisconsin, Madison, WI, USA", 2655 keywords = "function approximation; function evaluation; subroutines", 2656} 2657 2658@Article{Dial:1970:AAD, 2659 author = "R. B. Dial", 2660 title = "{ACM} Algorithm 394: Decision Table Translation", 2661 journal = j-CACM, 2662 volume = "13", 2663 number = "9", 2664 pages = "571--573 (or 571--572??)", 2665 month = sep, 2666 year = "1970", 2667 CODEN = "CACMA2", 2668 ISSN = "0001-0782", 2669 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2670 acknowledgement = ack-nhfb, 2671 classcodes = "C6150C (Compilers, interpreters and other processors)", 2672 corpsource = "Univ. Washington, Seattle, WA, USA", 2673 keywords = "decision tables; program interpreters; subroutines", 2674} 2675 2676@Article{Lamport:1970:CBQ, 2677 author = "Leslie Lamport and J. R. Bell", 2678 title = "Comment on {Bell}'s Quadratic Quotient Method for Hash Code Searching", 2679 journal = j-CACM, 2680 volume = "13", 2681 number = "9", 2682 pages = "573--574", 2683 month = sep, 2684 year = "1970", 2685 CODEN = "CACMA2", 2686 ISSN = "0001-0782", 2687 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2688 acknowledgement = ack-nhfb, 2689 classcodes = "C6130 (Data handling techniques)", 2690 keywords = "codes; data handling", 2691} 2692 2693@Article{Bavel:1970:NAS, 2694 author = "Z. Bavel", 2695 title = "On the Number of Automorphisms of a Singly Generated Automaton", 2696 journal = j-CACM, 2697 volume = "13", 2698 number = "9", 2699 pages = "574--575", 2700 month = sep, 2701 year = "1970", 2702 CODEN = "CACMA2", 2703 ISSN = "0001-0782", 2704 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2705 acknowledgement = ack-nhfb, 2706 classcodes = "C4220 (Automata theory)", 2707 corpsource = "Univ. Kansas, Lawrence, KS, USA", 2708 keywords = "automata; automorphisms; finite automata; generators; length of state; minimal-length generators; orbit; singly generated automata", 2709} 2710 2711@Article{Woods:1970:TNG, 2712 author = "W. A. Woods", 2713 title = "Transition Network Grammars for Natural Language Analysis", 2714 journal = j-CACM, 2715 volume = "13", 2716 number = "10", 2717 pages = "591--606", 2718 month = oct, 2719 year = "1970", 2720 CODEN = "CACMA2", 2721 ISSN = "0001-0782", 2722 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2723 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 2724 acknowledgement = ack-nhfb, 2725 classcodes = "C4210 (Formal logic); C7820 (Humanities computing)", 2726 corpsource = "Harvard Univ., Cambridge, MA, USA", 2727 keywords = "grammars; language translation and linguistics", 2728} 2729 2730@Article{Earley:1970:FTI, 2731 author = "J. Earley and H. Sturgis", 2732 title = "A formalism for translator interactions", 2733 journal = j-CACM, 2734 volume = "13", 2735 number = "10", 2736 pages = "607--617", 2737 month = oct, 2738 year = "1970", 2739 CODEN = "CACMA2", 2740 ISSN = "0001-0782", 2741 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2742 bibsource = "Compendex database", 2743 abstract = "A formalism is presented for describing the actions of processors for programming languages-compilers, interpreters, assemblers-and their interactions in complex systems such as compiler-compilers or extendible languages. An algorithm is presented for deciding whether or not a given system can be produced from a given set of component processors.", 2744 acknowledgement = ack-nhfb, 2745 classcodes = "C4210 (Formal logic); C6150C (Compilers, interpreters and other processors)", 2746 corpsource = "Univ. California, Berkeley, CA, USA", 2747 journalabr = "Commun ACM", 2748 keywords = "CACMA; compilers; computational linguistics; computer, digital; computers, digital, languages; computers, digital, operating; pre; program; program assemblers; program interpreters; program processors; programming languages", 2749} 2750 2751@Article{Hill:1970:AASa, 2752 author = "G. W. Hill", 2753 title = "{ACM} Algorithm 395: {Student}'s $t$-Distribution", 2754 journal = j-CACM, 2755 volume = "13", 2756 number = "10", 2757 pages = "617--619", 2758 month = oct, 2759 year = "1970", 2760 CODEN = "CACMA2", 2761 ISSN = "0001-0782", 2762 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2763 note = "See also \cite{Lozy:1979:RSD,Hill:1981:RSD}.", 2764 acknowledgement = ack-nhfb, 2765 classcodes = "C7310 (Mathematics computing)", 2766 corpsource = "CSIRO, Glen Osmond, Australia", 2767 keywords = "statistics; subroutines", 2768} 2769 2770@Article{Hill:1970:AASb, 2771 author = "G. W. Hill", 2772 title = "{ACM} Algorithm 396: {Student}'s $t$-Quantiles", 2773 journal = j-CACM, 2774 volume = "13", 2775 number = "10", 2776 pages = "619--620", 2777 month = oct, 2778 year = "1970", 2779 CODEN = "CACMA2", 2780 ISSN = "0001-0782", 2781 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2782 note = "See also \cite{Hill:1981:RSQ}.", 2783 acknowledgement = ack-nhfb, 2784 classcodes = "C4120 (Functional analysis); C7310 (Mathematics computing)", 2785 corpsource = "CSIRO, Glen Osmond, Australia", 2786 keywords = "function evaluation; statistics; subroutines", 2787} 2788 2789@Article{Chang:1970:AAI, 2790 author = "S. K. Chang and A. Gill", 2791 title = "{ACM} Algorithm 397: An Integer Programming Problem", 2792 journal = j-CACM, 2793 volume = "13", 2794 number = "10", 2795 pages = "620--621", 2796 month = oct, 2797 year = "1970", 2798 CODEN = "CACMA2", 2799 ISSN = "0001-0782", 2800 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2801 acknowledgement = ack-nhfb, 2802 classcodes = "C7310 (Mathematics computing)", 2803 corpsource = "Univ. California, Berkeley, CA, USA", 2804 keywords = "integer programming; subroutines", 2805} 2806 2807@Article{Stone:1970:AAT, 2808 author = "R. A. Stone", 2809 title = "{ACM} Algorithm 398: Tableless Date Conversion", 2810 journal = j-CACM, 2811 volume = "13", 2812 number = "10", 2813 pages = "621--621", 2814 month = oct, 2815 year = "1970", 2816 CODEN = "CACMA2", 2817 ISSN = "0001-0782", 2818 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2819 acknowledgement = ack-nhfb, 2820 classcodes = "C6130 (Data handling techniques)", 2821 corpsource = "Western Electric Co., Princeton, NJ, USA", 2822 keywords = "code convertors; subroutines", 2823} 2824 2825@Article{Seppanen:1970:AAS, 2826 author = "J. J. Sepp{\"{a}}nen", 2827 title = "{ACM} Algorithm 399: Spanning Tree", 2828 journal = j-CACM, 2829 volume = "13", 2830 number = "10", 2831 pages = "621--622", 2832 month = oct, 2833 year = "1970", 2834 CODEN = "CACMA2", 2835 ISSN = "0001-0782", 2836 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2837 acknowledgement = ack-nhfb, 2838 classcodes = "C7310 (Mathematics computing)", 2839 corpsource = "Helsinki Univ. Technol., Otaniemi, Finland", 2840 keywords = "graph theory; subroutines; trees (mathematics)", 2841} 2842 2843@Article{Wallick:1970:AAM, 2844 author = "G. C. Wallick", 2845 title = "{ACM} Algorithm 400: Modified {Havie} Integration", 2846 journal = j-CACM, 2847 volume = "13", 2848 number = "10", 2849 pages = "622--624", 2850 month = oct, 2851 year = "1970", 2852 CODEN = "CACMA2", 2853 ISSN = "0001-0782", 2854 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2855 acknowledgement = ack-nhfb, 2856 classcodes = "C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 2857 corpsource = "Mobil Res. Dev. Corp., Dallas, TX, USA", 2858 keywords = "integration; subroutines", 2859} 2860 2861@Article{Peto:1970:RAM, 2862 author = "R. Peto", 2863 title = "Remark on {``Algorithm 347 [M1]: An Efficient Algorithm for Sorting with Minimal Storage''}", 2864 journal = j-CACM, 2865 volume = "13", 2866 number = "10", 2867 pages = "624", 2868 month = oct, 2869 year = "1970", 2870 CODEN = "CACMA2", 2871 ISSN = "0001-0782", 2872 bibdate = "Tue May 28 09:23:57 1996", 2873 keywords = "digital computer sorting; minimal storage sorting; ranking; sorting", 2874} 2875 2876@Article{Smith:1970:UIG, 2877 author = "L. B. Smith", 2878 title = "The use of interactive graphics to solve numerical problems", 2879 journal = j-CACM, 2880 volume = "13", 2881 number = "10", 2882 pages = "625--634", 2883 month = oct, 2884 year = "1970", 2885 CODEN = "CACMA2", 2886 ISSN = "0001-0782", 2887 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2888 acknowledgement = ack-nhfb, 2889 classcodes = "C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 2890 corpsource = "CERN, Geneva, Switzerland", 2891 keywords = "analysis; computer graphics; least squares approximations; numerical; online operation", 2892} 2893 2894@Article{LaFata:1970:IDA, 2895 author = "P. LaFata and J. B. Rosen", 2896 title = "An interactive display for approximation by linear programming", 2897 journal = j-CACM, 2898 volume = "13", 2899 number = "11", 2900 pages = "651--659", 2901 month = nov, 2902 year = "1970", 2903 CODEN = "CACMA2", 2904 ISSN = "0001-0782", 2905 MRclass = "68.00 (90.00)", 2906 MRnumber = "42\#2712", 2907 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2908 abstract = "An interactive program with a graphical display has been developed for the approximation of data by means of a linear combination of functions (including splines) selected by the user. The coefficients of the approximation are determined by linear programming so as to minimize the error in either the L1 or L-infinity norm. Auxiliary conditions such as monotonicity or convexity of the approximation can also be imposed. This interactive system is described and several examples of its use are given.", 2909 acknowledgement = ack-nhfb, 2910 classcodes = "C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 2911 corpsource = "Univ. Wisconsin, Madison, WI, USA", 2912 keywords = "approximation; data fitting; function approximation; functional approximation; interactive graphical display; linear programming; online operation; spline functions", 2913} 2914 2915@Article{Lum:1970:MRC, 2916 author = "V. Y. Lum", 2917 title = "Multi-attribute retrieval with combined indexes", 2918 journal = j-CACM, 2919 volume = "13", 2920 number = "11", 2921 pages = "660--665", 2922 month = nov, 2923 year = "1970", 2924 CODEN = "CACMA2", 2925 ISSN = "0001-0782", 2926 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2927 acknowledgement = ack-nhfb, 2928 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 2929 corpsource = "IBM, San Jose, CA, USA", 2930 keywords = "file organisation; information retrieval", 2931} 2932 2933@Article{Mifsud:1970:MDA, 2934 author = "C. J. Mifsud", 2935 title = "A multiple-precision division algorithm", 2936 journal = j-CACM, 2937 volume = "13", 2938 number = "11", 2939 pages = "666--668", 2940 month = nov, 2941 year = "1970", 2942 CODEN = "CACMA2", 2943 ISSN = "0001-0782", 2944 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2945 acknowledgement = ack-nhfb, 2946 classcodes = "C5230 (Digital arithmetic methods)", 2947 corpsource = "Mitre Corp., McLean, VA, USA", 2948 keywords = "digital arithmetic", 2949} 2950 2951@Article{Conrow:1970:NPS, 2952 author = "K. Conrow and R. G. Smith", 2953 title = "{NEATER2}: {A PL/I} Source Statement Reformatter", 2954 journal = j-CACM, 2955 volume = "13", 2956 number = "11", 2957 pages = "669--675", 2958 month = nov, 2959 year = "1970", 2960 CODEN = "CACMA2", 2961 ISSN = "0001-0782", 2962 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2963 abstract = "NEATER2 accepts a PL/I source program and operates on it to produce a reformatted version. When in the LOGICAL mode, NEATER2 indicates the logical structure of the source program in the indentation pattern of its output. Logic errors discovered through NEATER2 logical analysis are discovered much more economically than is possible through compilation and trial runs. A number of options are available to give the user full control over the output format and to maximize the utility of NEATER2 as an aid during the early stages of development of a PL/I source deck. One option, USAGE, causes NEATER2 to insert into each logical unit of coding a statement which will case the number of times each one is executed to be recorded during execution. This feature is expected to provide a major aid in optimization of PL/I programs.", 2964 acknowledgement = ack-nhfb, 2965 classcodes = "C6150C (Compilers, interpreters and other processors)", 2966 corpsource = "Kansas State Univ., Manhattan, KS, USA", 2967 keywords = "documentation aid; execution time usage data; logical analysis of PL/I source; optimisation; PL/1; prettyprinter; program processors; reformatting of PL/I source", 2968} 2969 2970@Article{Bell:1970:LQH, 2971 author = "James R. Bell and Charles H. Kaman", 2972 title = "The Linear Quotient Hash Code", 2973 journal = j-CACM, 2974 volume = "13", 2975 number = "11", 2976 pages = "675--677", 2977 month = nov, 2978 year = "1970", 2979 CODEN = "CACMA2", 2980 ISSN = "0001-0782", 2981 bibdate = "Tue Mar 25 13:26:09 MST 1997", 2982 note = "Independent discovery of technique of secondary hash functions first proposed by \cite{deBalbine:1969:CAR}.", 2983 acknowledgement = ack-nhfb, 2984 classcodes = "C6130 (Data handling techniques)", 2985 corpsource = "Digital Equipment Corp., Maynard, MA, USA", 2986 keywords = "codes", 2987} 2988 2989@Article{Cheney:1970:NLC, 2990 author = "C. J. Cheney", 2991 title = "A Nonrecursive List Compacting Algorithm", 2992 journal = j-CACM, 2993 volume = "13", 2994 number = "11", 2995 pages = "677--678", 2996 month = nov, 2997 year = "1970", 2998 CODEN = "CACMA2", 2999 ISSN = "0001-0782", 3000 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3001 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 3002 acknowledgement = ack-nhfb, 3003 classcodes = "C6120 (File organisation)", 3004 corpsource = "Univ. Cambridge, UK", 3005 keywords = "data structures; list processing; storage management", 3006} 3007 3008@Article{Anonymous:1970:PANa, 3009 author = "Anonymous", 3010 title = "Proposed {American National Standard}. Recorded magnetic tape for information interchange (1600 {CPI}, phase encoded)", 3011 journal = j-CACM, 3012 volume = "13", 3013 number = "11", 3014 pages = "679--685", 3015 month = nov, 3016 year = "1970", 3017 CODEN = "CACMA2", 3018 ISSN = "0001-0782", 3019 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3020 acknowledgement = ack-nhfb, 3021 classcodes = "C5320C (Storage on moving magnetic media)", 3022 keywords = "magnetic recording; standards", 3023} 3024 3025@Article{Anonymous:1970:PANb, 3026 author = "Anonymous", 3027 title = "Proposed {American National Standard}. Unrecorded magnetic tape for information interchange (9 track-200 and 800 {CPI}, {NRZI} and 1600 {CPI}, {P.E.})", 3028 journal = j-CACM, 3029 volume = "13", 3030 number = "11", 3031 pages = "686--692", 3032 month = nov, 3033 year = "1970", 3034 CODEN = "CACMA2", 3035 ISSN = "0001-0782", 3036 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3037 acknowledgement = ack-nhfb, 3038 classcodes = "C5320C (Storage on moving magnetic media)", 3039 keywords = "magnetic recording; standards", 3040} 3041 3042@Article{Bratley:1970:AAI, 3043 author = "P. Bratley", 3044 title = "{ACM} Algorithm 401: An Improved Algorithm to Produce Complex Primes", 3045 journal = j-CACM, 3046 volume = "13", 3047 number = "11", 3048 pages = "693--693", 3049 month = nov, 3050 year = "1970", 3051 CODEN = "CACMA2", 3052 ISSN = "0001-0782", 3053 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3054 acknowledgement = ack-nhfb, 3055 classcodes = "C7310 (Mathematics computing)", 3056 corpsource = "Univ. Montreal, Que., Canada", 3057 keywords = "number theory; subroutines", 3058} 3059 3060@Article{vanEmden:1970:AAI, 3061 author = "M. H. {van Emden}", 3062 title = "{ACM} Algorithm 402: Increasing the Efficiency of Quicksort", 3063 journal = j-CACM, 3064 volume = "13", 3065 number = "11", 3066 pages = "693--694", 3067 month = nov, 3068 year = "1970", 3069 CODEN = "CACMA2", 3070 ISSN = "0001-0782", 3071 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3072 acknowledgement = ack-nhfb, 3073 classcodes = "C6130 (Data handling techniques)", 3074 corpsource = "Math. Centre, Amsterdam, Netherlands", 3075 keywords = "sorting; subroutines", 3076} 3077 3078@Article{Wilson:1970:GMG, 3079 author = "W. J. Wilson", 3080 title = "A generalized method for generating argument\slash function values", 3081 journal = j-CACM, 3082 volume = "13", 3083 number = "11", 3084 pages = "696--697", 3085 month = nov, 3086 year = "1970", 3087 CODEN = "CACMA2", 3088 ISSN = "0001-0782", 3089 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3090 acknowledgement = ack-nhfb, 3091 classcodes = "C6110 (Systems analysis and programming)", 3092 corpsource = "Univac Div. Sperry Rand, Huntsville, AL, USA", 3093 keywords = "decision tables; table lookup", 3094} 3095 3096@Article{Ehrman:1970:CAC, 3097 author = "J. R. Ehrman", 3098 title = "Correction to 'logical' arithmetic on computers with two's complement binary arithmetic", 3099 journal = j-CACM, 3100 volume = "13", 3101 number = "11", 3102 pages = "697--698", 3103 month = nov, 3104 year = "1970", 3105 CODEN = "CACMA2", 3106 ISSN = "0001-0782", 3107 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3108 acknowledgement = ack-nhfb, 3109 classcodes = "C5230 (Digital arithmetic methods)", 3110 corpsource = "Stanford Linear Accelerator Center, CA, USA", 3111 keywords = "digital arithmetic", 3112} 3113 3114@Article{Bernstein:1970:CWS, 3115 author = "A. Bernstein", 3116 title = "Comment on the working set model for program behavior", 3117 journal = j-CACM, 3118 volume = "13", 3119 number = "11", 3120 pages = "698--699", 3121 month = nov, 3122 year = "1970", 3123 CODEN = "CACMA2", 3124 ISSN = "0001-0782", 3125 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3126 acknowledgement = ack-nhfb, 3127 classcodes = "C6120 (File organisation)", 3128 corpsource = "State Univ. New York, Stony Brook, NY, USA", 3129 keywords = "storage management", 3130} 3131 3132@Article{Rokne:1970:CNP, 3133 author = "J. Rokne", 3134 title = "Condition numbers of {Pei} matrices", 3135 journal = j-CACM, 3136 volume = "13", 3137 number = "11", 3138 pages = "699--699", 3139 month = nov, 3140 year = "1970", 3141 CODEN = "CACMA2", 3142 ISSN = "0001-0782", 3143 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3144 acknowledgement = ack-nhfb, 3145 classcodes = "C4140 (Linear algebra)", 3146 corpsource = "Univ. Calgary, Alta., Canada", 3147 keywords = "matrix algebra", 3148} 3149 3150@Article{Mathews:1970:GPC, 3151 author = "M. V. Mathews and F. R. Moore", 3152 title = "{GROOVE-A} program to compose, store, and edit functions of time", 3153 journal = j-CACM, 3154 volume = "13", 3155 number = "12", 3156 pages = "715--721", 3157 month = dec, 3158 year = "1970", 3159 CODEN = "CACMA2", 3160 ISSN = "0001-0782", 3161 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3162 acknowledgement = ack-nhfb, 3163 classcodes = "C7420 (Control engineering computing); C7820 (Humanities computing)", 3164 corpsource = "Bell Telephone Labs., Murray Hill, NJ, USA", 3165 keywords = "compose store, edit, time functions; computer music; computers; conductor program; control engineering applications of computers; digital control; GROOVE; hybrid; hybrid systems; interactive software; luminescence; man computer system; man-machine systems; periodic functions; real-time; real-time control; sampled data systems; systems", 3166 treatment = "P Practical", 3167} 3168 3169@Article{Tiernan:1970:ESA, 3170 author = "James C. Tiernan", 3171 title = "An Efficient Search Algorithm to Find the Elementary Circuits of a Graph", 3172 journal = j-CACM, 3173 volume = "13", 3174 number = "12", 3175 pages = "722--726", 3176 month = dec, 3177 year = "1970", 3178 CODEN = "CACMA2", 3179 ISSN = "0001-0782", 3180 MRclass = "94.30 (05.00)", 3181 MRnumber = "42\#7427", 3182 mrreviewer = "J. Mor{\'a}vek", 3183 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3184 abstract = "A theoretically most efficient search algorithm is presented which uses an exhaustive search to find all of the elementary circuits of a graph. The algorithm can be easily modified to find all of the elementary circuits with a particular attribute such as length. A rigorous proof of the algorithm is given as well as an example of its application. Empirical bounds are presented relating the speed of the algorithm to the number of vertices and the number of arcs. The speed is also related to the number of circuits in the graph to give a relation between speed and complexity. Extensions to undirected and s-graphs are discussed.", 3185 acknowledgement = ack-nhfb, 3186 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics)", 3187 corpsource = "Univ. California, San Diego, La Jolla, CA, USA", 3188 keywords = "algorithm; circuit search algorithm; elementary circuits; graph theory; path search; path search algorithm; searching", 3189 treatment = "T Theoretical or Mathematical", 3190} 3191 3192@Article{Betourne:1970:PMR, 3193 author = "C. Betourne and J. Boulenger and J. Ferrie and C. Kaiser and S. Krakowiak and J. Mossiere", 3194 title = "Process management and resource sharing in the multiaccess system {ESOPE}", 3195 journal = j-CACM, 3196 volume = "13", 3197 number = "12", 3198 pages = "727--733", 3199 month = dec, 3200 year = "1970", 3201 CODEN = "CACMA2", 3202 ISSN = "0001-0782", 3203 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3204 acknowledgement = ack-nhfb, 3205 classcodes = "C6150J (Operating systems)", 3206 keywords = "ESOPE; multi-access systems; multiprogramming; parallel processes; parallel processing; primitive operations; process scheduling; programs; resource allocation; system; time sharing system; time-sharing", 3207 treatment = "P Practical", 3208} 3209 3210@Article{Morgan:1970:IBO, 3211 author = "H. L. Morgan", 3212 title = "An interrupt based organization for management information systems", 3213 journal = j-CACM, 3214 volume = "13", 3215 number = "12", 3216 pages = "734--739", 3217 month = dec, 3218 year = "1970", 3219 CODEN = "CACMA2", 3220 ISSN = "0001-0782", 3221 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3222 acknowledgement = ack-nhfb, 3223 classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", 3224 corpsource = "Cornell Univ., Ithaca, NY, USA", 3225 keywords = "data handling; integrated data processing; interrupt scheduling; management information systems; monitoring; parallel; parallel processing; processing; supervisory programs; supervisory systems; systems", 3226} 3227 3228@Article{Thompson:1970:IRR, 3229 author = "R. J. Thompson", 3230 title = "Improving round-off in {Runge-Kutta} computations with {Gill}'s method", 3231 journal = j-CACM, 3232 volume = "13", 3233 number = "12", 3234 pages = "739--740", 3235 month = dec, 3236 year = "1970", 3237 CODEN = "CACMA2", 3238 ISSN = "0001-0782", 3239 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3240 acknowledgement = ack-nhfb, 3241 classcodes = "C4170 (Differential equations)", 3242 corpsource = "Sandia Labs., Albuquerque, NM, USA", 3243 keywords = "differential equations; error analysis; methods; numerical mathematics; ordinary differential equations; predictor-corrector; round-off error; Runge-Kutta-Gill methods", 3244 treatment = "T Theoretical or Mathematical", 3245} 3246 3247@Article{Shapiro:1970:LSG, 3248 author = "S. C. Shapiro", 3249 title = "The list set generator: a construct for evaluating set expressions", 3250 journal = j-CACM, 3251 volume = "13", 3252 number = "12", 3253 pages = "741--744", 3254 month = dec, 3255 year = "1970", 3256 CODEN = "CACMA2", 3257 ISSN = "0001-0782", 3258 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3259 acknowledgement = ack-nhfb, 3260 classcodes = "C6130 (Data handling techniques)", 3261 corpsource = "Univ. Wisconsin, Madison, WI, USA", 3262 keywords = "construct; file; list processing; processing; programming; programming techniques; set generation; set manipulating", 3263 treatment = "T Theoretical or Mathematical", 3264} 3265 3266@Article{Black:1970:OMM, 3267 author = "N. A. Black", 3268 title = "Optimum Merging from Mass Storage", 3269 journal = j-CACM, 3270 volume = "13", 3271 number = "12", 3272 pages = "745--749", 3273 month = dec, 3274 year = "1970", 3275 CODEN = "CACMA2", 3276 ISSN = "0001-0782", 3277 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3278 acknowledgement = ack-nhfb, 3279 classcodes = "C6130 (Data handling techniques)", 3280 corpsource = "Computer Sci. Corp., Huntsville, AL, USA", 3281 keywords = "access time; drum merging; magnetic storage systems; mass storage; merging; optimisation; optimum merging; sort timing; sorting", 3282 treatment = "T Theoretical or Mathematical", 3283} 3284 3285@Article{Stewart:1970:EAA, 3286 author = "G. W. Stewart", 3287 title = "Errata: {ACM} Algorithm 384: Eigenvalues and Eigenvectors of a Real Symmetric Matrix [{F2}]", 3288 journal = j-CACM, 3289 volume = "13", 3290 number = "12", 3291 pages = "750--750", 3292 month = dec, 3293 year = "1970", 3294 CODEN = "CACMA2", 3295 ISSN = "0001-0782", 3296 bibdate = "Tue May 28 18:42:33 1996", 3297 note = "See \cite{Stewart:1970:AAE}.", 3298 keywords = "eigenvalues; eigenvectors; QR algorithm; real symmetric matrix", 3299 kwds = "nla, eig, QR algorithm, symmetric matrix", 3300 xxnote = "Check title??", 3301} 3302 3303@Article{Fuchs:1970:EDR, 3304 author = "E. A. Fuchs and P. E. Jackson", 3305 title = "Estimates of Distributions of Random Variables for Certain Computer Communications Traffic Models", 3306 journal = j-CACM, 3307 volume = "13", 3308 number = "12", 3309 pages = "752--757", 3310 month = dec, 3311 year = "1970", 3312 CODEN = "CACMA2", 3313 ISSN = "0001-0782", 3314 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3315 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/network.bib and ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1970.bib", 3316 note = "Reproduced in Advances in Computer Commun., Chu, W. W., (Ed (1974), 2-7; in Computer Commun., Green, P. E., and Lucky, R. W. (Eds.), (1975), 577-582).", 3317 abstract = "A study of multiaccess computer communications has characterized the distributions underlying an elementary model of the user-computer interactive process. The model used is elementary in the sense that many of the random variables that generally are of interest in computer communications studies can be decomposed into the elements of this model. Data were examined from four operational multiaccess systems, and the model is shown to be robust; that is each of the variables of the model has the same distribution independent of which of the four systems is being examined. It is shown that the gamma distribution can be used to describe the discrete variables. Approximations to the gamma distribution by the exponential distribution are discussed for the systems studied.", 3318 acknowledgement = ack-nhfb, 3319 classcodes = "C4290 (Other computer theory)", 3320 corpsource = "Bell Telephone Labs. Inc., Holmdel, NJ, USA", 3321 descriptors = "Random Process; Computer Communication; Traffic Model; Distribution; Estimation;", 3322 keywords = "computation theory; computer communications; distribution of random variables; modelling; multi-access systems; multiaccess systems; operating systems; operating systems (computers); optimisation models; optimization models; time-sharing; time-sharing systems; user computer interactive processes", 3323 treatment = "T Theoretical or Mathematical", 3324} 3325 3326@Article{Pinter:1970:DBF, 3327 author = "C. C. Pinter", 3328 title = "On decomposing a {Boolean} function and simplifying the components separately", 3329 journal = j-CACM, 3330 volume = "13", 3331 number = "12", 3332 pages = "758--758", 3333 month = dec, 3334 year = "1970", 3335 CODEN = "CACMA2", 3336 ISSN = "0001-0782", 3337 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3338 acknowledgement = ack-nhfb, 3339 classcodes = "C4230 (Switching theory)", 3340 corpsource = "Bucknell Univ., Lewisburg, PA, USA", 3341 keywords = "basic cells; Boolean functions; minimisation; minimisation of switching nets; of Boolean functions; prime implicants; simplification; vertices", 3342 treatment = "T Theoretical or Mathematical", 3343} 3344 3345@Article{Raduchel:1970:EHB, 3346 author = "W. J. Raduchel", 3347 title = "Efficient handling of binary data", 3348 journal = j-CACM, 3349 volume = "13", 3350 number = "12", 3351 pages = "758--759", 3352 month = dec, 3353 year = "1970", 3354 CODEN = "CACMA2", 3355 ISSN = "0001-0782", 3356 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3357 acknowledgement = ack-nhfb, 3358 classcodes = "C6130 (Data handling techniques)", 3359 corpsource = "Harvard Univ., Cambridge, MA, USA", 3360 keywords = "binary variables; bit strings; cross-; data handling; dummy variables; efficiency; programming; programming techniques; tabulations", 3361 treatment = "T Theoretical or Mathematical", 3362} 3363 3364@Article{Wagner:1970:FAI, 3365 author = "Robert A. Wagner", 3366 title = "Finiteness Assumptions and Intellectual Isolation of Computer Scientists", 3367 journal = j-CACM, 3368 volume = "13", 3369 number = "12", 3370 pages = "759--760", 3371 month = dec, 3372 year = "1970", 3373 CODEN = "CACMA2", 3374 ISSN = "0001-0782", 3375 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3376 acknowledgement = ack-nhfb, 3377 classcodes = "C0200 (General computer topics)", 3378 corpsource = "Cornell Univ., Ithaca, NY, USA", 3379 keywords = "ALGOL versus FORTRAN; Algol vs. Fortran; finite; finite word size; finiteness assumptions; integer variable range; intellectual; intellectual isolation; isolation; memory finiteness; personnel; philosophical aspects; word size", 3380} 3381 3382@Article{Lowry:1971:OCO, 3383 author = "E. Lowry and C. W. Medlock", 3384 title = "Object Code Optimization", 3385 journal = j-CACM, 3386 volume = "12", 3387 number = "1", 3388 pages = "13--22", 3389 month = jan, 3390 year = "1971", 3391 CODEN = "CACMA2", 3392 ISSN = "0001-0782", 3393 bibdate = "Tue Dec 26 16:35:14 1995", 3394 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/opt.compiler.bib", 3395} 3396 3397@Article{Hammer:1971:SSC, 3398 author = "Carl Hammer", 3399 title = "Signature Simulation and Certain Cryptographic Codes", 3400 journal = j-CACM, 3401 volume = "14", 3402 number = "1", 3403 pages = "3--14", 3404 month = jan, 3405 year = "1971", 3406 CODEN = "CACMA2", 3407 ISSN = "0001-0782", 3408 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3409 abstract = "Three cyphers allegedly authored by Thomas Jefferson Beale in 1822 have been the subject of intensive study for over 100 years. Generations of cryptanalysts have expended untold man-years, thus far without success, attempting tode code them; vast armies of fortune hunters and treasure seekers have devoted Herculean labors to digging up the rolling hills of Virginia trying to locate the promised bonanza. \par The history of pertinent activities would fill volumes, yet serious students of cryptography have always had nagging doubts about the cyphers' authenticity. It has been alleged that the ``known solution'' to Cypher Number Two: 115, 73, 24, 818, 37, 52, 49, \ldots{} (``I have deposited in the County of Bedford about four miles from Buford's in an excavation or vault \ldots{}'') with the aid of an unsanitized version of the Declaration of Independence was merely a superb, imaginative, and grandiose hoax perpetrated ages ago for whatever reasons. Modern computer technology could obviously perform signature analyses the process of encoding itself so as to yield new clues and deeper insights into their construction. For the benefit of the uninitiated, the encoding method used in the second cypher employs a specified document whose words are simply numbered consecutively, and first letters of these words are sought out at random to match the letters of these words are sought out at random to match the letters of the clear text or message. \par The sequence of numbers corresponding to these matches is then written down as the final code. While primitive, the process has the advantage of relative security until the source document becomes known; at that moment the cypher can be decoded even by second graders. The work now completed with the help of our UNIVAC 1108 includes numerous analytical studies of the Beale cyphers and various types of simulations. \par For example, we have turned the entire process of simulated encoding by various schemes over to the machine and analyzed the signatures of these synthetic codes; we have also encoded various messages by hand, using different texts and a variety of methods to obtain their signatures. These simulations provide convincing evidence that the signatures are both process and data dependent; they indicate also very strongly that Mr. Beale's cyphers are for real and that it is merely a matter of time before someone finds the correct source document and locates the right vault in the common-wealth of Virginia.", 3410 acknowledgement = ack-nhfb, 3411 classcodes = "B6120B (Codes); C6130 (Data handling techniques)", 3412 keywords = "Beale Cyphers codes; codes; computer applications; computer signature simulation; cryptanalysis; cyphers; Declaration of Independence; decoding; encoding; Magna Carta; numerical cryptographic codes; pseudotext; results analysis; signature; simulation; Thomas Jefferson Beale; treasure site identification", 3413 treatment = "A Application", 3414} 3415 3416@Article{Klinger:1971:PWA, 3417 author = "A. Klinger", 3418 title = "Pattern width at a given angle", 3419 journal = j-CACM, 3420 volume = "14", 3421 number = "1", 3422 pages = "15--20", 3423 month = jan, 3424 year = "1971", 3425 CODEN = "CACMA2", 3426 ISSN = "0001-0782", 3427 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3428 acknowledgement = ack-nhfb, 3429 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 3430 corpsource = "Univ. California, Los Angeles, CA, USA", 3431 keywords = "extent integral projections; feature extraction; figure properties; functions; geometrical concept; integral geometry; linear pattern measures; pattern recognition; picture processing; width; width at angle; word description", 3432 treatment = "T Theoretical or Mathematical", 3433} 3434 3435@Article{Chang:1971:RBP, 3436 author = "Shi-Kuo Chang", 3437 title = "The Reconstruction of Binary Patterns from Their Projections", 3438 journal = j-CACM, 3439 volume = "14", 3440 number = "1", 3441 pages = "21--25", 3442 month = jan, 3443 year = "1971", 3444 CODEN = "CACMA2", 3445 ISSN = "0001-0782", 3446 MRclass = "68.00", 3447 MRnumber = "44\#2379", 3448 mrreviewer = "G. D. Chakerian", 3449 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3450 bibsource = "Compendex database", 3451 abstract = "Given the horizontal and vertical projections of a finite binary pattern $f$, can we construct the original pattern $f$? In this paper we give a characterization of patterns that are reconstructible from their projection. Three algorithms are developed to reconstruct both unambiguous and ambiguous patterns. It is shown that an unambiguous pattern can be perfectly reconstructed in time $m \times n$ and that a pattern similar to an ambiguous pattern can also be constructed in time $m \times n$, where $m$, $n$ are the dimensions of the pattern frame.", 3452 acknowledgement = ack-nhfb, 3453 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 3454 corpsource = "IBM, Yorktown Heights, NY, USA", 3455 journalabr = "Commun ACM", 3456 keywords = "ATI; CACMA; computers, digital; data compression; finite binary pattern; image reconstruction; integral geometry; original pattern reconstruction; pattern frame dimensions; pattern recognition; pattern recognition systems; pattern reconstruction", 3457 treatment = "T Theoretical or Mathematical", 3458} 3459 3460@Article{Bracchi:1971:LTG, 3461 author = "G. Bracchi and D. Ferrari", 3462 title = "Language for Treating Geometric Patterns in a Two-Dimensional Space", 3463 journal = j-CACM, 3464 volume = "14", 3465 number = "1", 3466 pages = "26--32", 3467 month = jan, 3468 year = "1971", 3469 CODEN = "CACMA2", 3470 ISSN = "0001-0782", 3471 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3472 bibsource = "Compendex database", 3473 abstract = "In this paper CADEP, a problem-oriented language for positioning geometric patterns in a two-dimensional space, is presented. Although the language has been specifically designed for the automatic generation of integrated circuit masks, it turns out to be well suited also for such other placement problems as architecture design, urban planning, logical and block diagram representation.", 3474 acknowledgement = ack-nhfb, 3475 classcodes = "C6140D (High level languages)", 3476 corpsource = "Politecnico Milano, Italy", 3477 journalabr = "Commun ACM", 3478 keywords = "2-dimensional space; architecture design; automation; block diagrams; CACMA; CADEP; computers, digital; computers, digital, pattern re; Fortran; Fortran extension; generation; geometric patterns; graphic; graphic displays; integrated circuit masks; integrated circuits; language; languages; layout problems; logic diagrams representation; pattern recognition; pattern recognition systems; planning; positioning; problem oriented language; problem oriented languages; urban; urban planning", 3479 treatment = "T Theoretical or Mathematical", 3480} 3481 3482@Article{Broucke:1971:CRN, 3483 author = "R. A. Broucke", 3484 title = "Construction of rational and negative powers of a formal series", 3485 journal = j-CACM, 3486 volume = "14", 3487 number = "1", 3488 pages = "32--35", 3489 month = jan, 3490 year = "1971", 3491 CODEN = "CACMA2", 3492 ISSN = "0001-0782", 3493 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3494 acknowledgement = ack-nhfb, 3495 classcodes = "C4130 (Interpolation and function approximation)", 3496 corpsource = "Univ. California, Los Angeles, CA, USA", 3497 keywords = "binomial; Chebyshev approximation; Chebyshev series; construction; convergence; convergence of numerical methods; Fourier series; inversion; iterative methods; Newton iterations; Poisson's; rational negative power; root extraction; series; series expansion; theorem", 3498 treatment = "T Theoretical or Mathematical", 3499} 3500 3501@Article{Holt:1971:CPS, 3502 author = "R. C. Holt", 3503 title = "Comments on Prevention of System Deadlocks", 3504 journal = j-CACM, 3505 volume = "14", 3506 number = "1", 3507 pages = "36--38", 3508 month = jan, 3509 year = "1971", 3510 CODEN = "CACMA2", 3511 ISSN = "0001-0782", 3512 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3513 bibsource = "Compendex database", 3514 abstract = "A. N. Habermann's method of deadlock prevention is discussed, where deadlock is defined as a system state from which resource allocations to certain processes are not possible. It is shown that the scheduler may introduce `artificial' deadlocks which Habermann's method does not prevent. Permanent blocking is the situation where certain processes never receive their resource requests. It is shown that deadlock prevention does not necessarily eliminate permanent blocking. A method of preventing permanent blocking is given.", 3515 acknowledgement = ack-nhfb, 3516 classcodes = "C6150J (Operating systems)", 3517 corpsource = "Cornell Univ. Ithaca, NY, USA", 3518 journalabr = "Commun ACM", 3519 keywords = "CACMA; computers, digital; computers, digital, operation; deadly embrace; Habermann's method; interlock; knotting; layout; multiprogramming; operating systems (computers); permanent blocking preventions; resource allocation; scheduling; storage allocation; system deadlock prevention; system recovery; time sharing", 3520 treatment = "T Theoretical or Mathematical", 3521} 3522 3523@Article{Hoare:1971:PPF, 3524 author = "C. A. R. Hoare", 3525 title = "Proof of a Program: {FIND}", 3526 journal = j-CACM, 3527 volume = "14", 3528 number = "1", 3529 pages = "39--45", 3530 month = jan, 3531 year = "1971", 3532 CODEN = "CACMA2", 3533 ISSN = "0001-0782", 3534 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3535 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/ml.bib", 3536 abstract = "An informal description is given of the purpose of the program and the method used. A systematic technique is described for constructing and the program proof during the process of coding it, in such a way as to prevent the intrusion of logical errors. The proof of termination is treated as a separate exercise. Some, conclusions relating to general programming methodology are drawn.", 3537 acknowledgement = ack-nhfb, 3538 classcodes = "C4290 (Other computer theory)", 3539 corpsource = "Queen's Univ. Belfast, UK", 3540 journalabr = "Commun ACM", 3541 keywords = "algorithm correctness; algorithm theory; CACMA; coding; computers, digital; computers, digital, programming; documentation; FIND; ITI; languages; logical errors intrusion; programming methodology; programming theory; programs proofs", 3542 treatment = "T Theoretical or Mathematical", 3543} 3544 3545@Article{Proll:1971:FEA, 3546 author = "L. G. Proll", 3547 title = "Further evidence for the analysis of algorithms for the zero-one programming problem", 3548 journal = j-CACM, 3549 volume = "14", 3550 number = "1", 3551 pages = "46--47", 3552 month = jan, 3553 year = "1971", 3554 CODEN = "CACMA2", 3555 ISSN = "0001-0782", 3556 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3557 bibsource = "Compendex database", 3558 abstract = "The purpose of this note is to report computational experience additional to that recently summarized R. L. Gue et al, with two algorithms for the zero-one linear programming problem. An error in Gue's paper is corrected. The utility of one of the algorithms as a suboptimizer is indicated.", 3559 acknowledgement = ack-nhfb, 3560 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)", 3561 corpsource = "Univ. Southampton, UK", 3562 journalabr = "Commun ACM", 3563 keywords = "algorithm analysis; algorithm theory; CACMA; computational; ES,; experience; integer programming; linear programming; mathematics; operations research; suboptimisation; zero one variables", 3564 treatment = "T Theoretical or Mathematical", 3565 xxtitle = "Further Evidence of the Analysis of Algorithms for the Zeroone Programming Problem", 3566} 3567 3568@Article{Coleman:1971:AAC, 3569 author = "M. W. Coleman and M. S. Taylor", 3570 title = "{ACM} Algorithm 403: Circular Integer Partitioning", 3571 journal = j-CACM, 3572 volume = "14", 3573 number = "1", 3574 pages = "48--48", 3575 month = jan, 3576 year = "1971", 3577 CODEN = "CACMA2", 3578 ISSN = "0001-0782", 3579 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3580 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/acm.bib", 3581 acknowledgement = ack-nhfb, 3582 classcodes = "C7310 (Mathematics computing)", 3583 corpsource = "Aberdeen Proving Ground, MD, USA", 3584 keywords = "circular integer partitioning; combinations; design; experiments design; number theory; statistical; subroutines", 3585 treatment = "T Theoretical or Mathematical", 3586} 3587 3588@Article{Lucas:1971:AAC, 3589 author = "C. W. {Lucas, Jr.} and C. W. Terrill", 3590 title = "{ACM} Algorithm 404: Complex Gamma Function", 3591 journal = j-CACM, 3592 volume = "14", 3593 number = "1", 3594 pages = "48--49 (or 48--48??)", 3595 month = jan, 3596 year = "1971", 3597 CODEN = "CACMA2", 3598 ISSN = "0001-0782", 3599 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3600 acknowledgement = ack-nhfb, 3601 classcodes = "C4120 (Functional analysis); C7310 (Mathematics computing)", 3602 corpsource = "Coll. William and Mary, Williamsburg, VA, USA", 3603 keywords = "algorithm; CGAMMA; complex gamma function evaluation; formula; function evaluation; poles of gamma function; recursion formula; reflection; Stirling's asymptotic series; subroutine in ALGOL; subroutines", 3604 treatment = "T Theoretical or Mathematical", 3605} 3606 3607@Article{Redish:1971:CLC, 3608 author = "K. A. Redish", 3609 title = "Comment on {London}'s Certification of Algorithm 245", 3610 journal = j-CACM, 3611 volume = "14", 3612 number = "1", 3613 pages = "50--51", 3614 month = jan, 3615 year = "1971", 3616 CODEN = "CACMA2", 3617 ISSN = "0001-0782", 3618 bibdate = "Fri Jan 17 18:29:55 1997", 3619 acknowledgement = ack-nhfb, 3620 keywords = "certification; debugging; in-place sorting; metatheory; proof of algorithms; sorting", 3621} 3622 3623@Article{Pollack:1971:CCD, 3624 author = "S. L. Pollack", 3625 title = "Comment on the conversion of decision tables to computer programs", 3626 journal = j-CACM, 3627 volume = "14", 3628 number = "1", 3629 pages = "52--52", 3630 month = jan, 3631 year = "1971", 3632 CODEN = "CACMA2", 3633 ISSN = "0001-0782", 3634 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3635 acknowledgement = ack-nhfb, 3636 classcodes = "C6110 (Systems analysis and programming)", 3637 corpsource = "S. D. Leidesdorf and Co., NY, USA", 3638 keywords = "aids; application; business; comments; communication; computer program; conversion; decision tables; diagnostic; systems analysis", 3639 treatment = "T Theoretical or Mathematical", 3640} 3641 3642@Article{Schwayder:1971:CLE, 3643 author = "K. Schwayder", 3644 title = "Conversion of Limited-Entry Decision Tables to Computer Programs. a Proposed Modification to {Pollack}'s Algorithm", 3645 journal = j-CACM, 3646 volume = "14", 3647 number = "2", 3648 pages = "69--73", 3649 month = feb, 3650 year = "1971", 3651 CODEN = "CACMA2", 3652 ISSN = "0001-0782", 3653 bibdate = "Thu Jan 16 19:52:47 MST 1997", 3654 bibsource = "Compendex database", 3655 abstract = "S. Pollack has proposed an algorithm for converting decision tables into flowcharts which minimize subsequent execution time when compiled into a computer program. Two modifications to this algorithm are proposed. The first relies on Shannon's noiseless coding theorem and the communications concept of entropy but does not completely test the ELSE Rule. The second modification completely tests the ELSE Rule but results in more executions than the first modification. Both modifications result in lower execution time than Pollack's algorithm. However, neither modification guarantees a globally optimal solution.", 3656 acknowledgement = ack-nhfb, 3657 journalabr = "Commun ACM", 3658 keywords = "CACMA; communication channels; computers, digital; information theory; programming; programs", 3659} 3660 3661@Article{Shwayder:1971:CLE, 3662 author = "K. Shwayder", 3663 title = "Conversion of limited-entry decision tables to computer programs-a proposed modification to {Pollack}'s algorithm", 3664 journal = j-CACM, 3665 volume = "14", 3666 number = "2", 3667 pages = "69--73", 3668 month = feb, 3669 year = "1971", 3670 CODEN = "CACMA2", 3671 ISSN = "0001-0782", 3672 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3673 acknowledgement = ack-nhfb, 3674 classcodes = "C6110 (Systems analysis and programming)", 3675 corpsource = "Univ. Chicago, IL, USA", 3676 keywords = "computer; conversion; decision tables; flow charting; flowcharting; modifications; Pollack's algorithm; programming; programs", 3677 treatment = "T Theoretical or Mathematical", 3678} 3679 3680@Article{Bernstein:1971:PST, 3681 author = "A. J. Bernstein and J. C. Sharp", 3682 title = "A policy-driven scheduler for a time-sharing system", 3683 journal = j-CACM, 3684 volume = "14", 3685 number = "2", 3686 pages = "74--78", 3687 month = feb, 3688 year = "1971", 3689 CODEN = "CACMA2", 3690 ISSN = "0001-0782", 3691 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3692 bibsource = "Compendex database", 3693 abstract = "A scheduling and swapping algorithm which keeps the resource count of each process above its policy function will provide the specified level of service. Overhead can be reduced by avoiding swaps of processes which have received at least this level of service. The algorithm has been implemented in a general purpose operating system, and it has provided significantly better service to interactive and to batch jobs than the previous scheduler.", 3694 acknowledgement = ack-nhfb, 3695 classcodes = "C6150J (Operating systems)", 3696 corpsource = "General Electric, Schenectady, NY, USA", 3697 journalabr = "Commun ACM", 3698 keywords = "CACMA; computation theory; computers, digital; computers, digital, operating; operating; operating systems (computers); policy driven; scheduler; scheduling algorithm; supervisory and executive programs; supervisory programs; systems; time sharing; time sharing systems; time-sharing systems", 3699 treatment = "T Theoretical or Mathematical", 3700} 3701 3702@Article{Nielsen:1971:AST, 3703 author = "N. R. Nielsen", 3704 title = "An analysis of some time-sharing techniques", 3705 journal = j-CACM, 3706 volume = "14", 3707 number = "2", 3708 pages = "79--90", 3709 month = feb, 3710 year = "1971", 3711 CODEN = "CACMA2", 3712 ISSN = "0001-0782", 3713 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3714 bibsource = "Compendex database", 3715 abstract = "The effectiveness of certain time-sharing techniques such as program relocation, disk rotational delay minimization, and swap volume minimization is investigated. Summary data is presented, and the findings are discussed. The vehicle for this investigation was a SI-MULA based simulation model reflecting an early framework for a planned Burroughs B6500 time-sharing system. Inasmuch as the B6500 system is based upon the use of variable sized segments and a dynamic overlay procedure, data is also presented which provides some indication of the effectiveness of this type of organization in a time-sharing environment. The design characteristics and operational capabilities of the simulation model are also described.", 3716 acknowledgement = ack-nhfb, 3717 classcodes = "C6150J (Operating systems)", 3718 corpsource = "Stanford Univ., CA, USA", 3719 journalabr = "Commun ACM", 3720 keywords = "CACMA; capabilities; computers, digital; computers, digital, operating; design characteristics; disk rotational delay; minimization; operating systems; operating systems (computers); operational; program relocation; simulation; simulation model; swap volume minimization; systems analysis; techniques; time sharing; time sharing systems; time-sharing systems", 3721 treatment = "P Practical", 3722} 3723 3724@Article{Slagle:1971:EAL, 3725 author = "J. R. Slagle and C. D. Farrell", 3726 title = "Experiments in Automatic Learning for a Multipurpose Heuristic Program", 3727 journal = j-CACM, 3728 volume = "14", 3729 number = "2", 3730 pages = "91--99 (or 91--98??)", 3731 month = feb, 3732 year = "1971", 3733 CODEN = "CACMA2", 3734 ISSN = "0001-0782", 3735 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3736 abstract = "An automatic learning capability has been developed and implemented for use with the MULTIPLE (MULTIpurpose Program that LEarns) heuristic tree-searching program, which is presently being applied to resolution theorem-proving in predicate calculus. MULTIPLE's proving program (PP) uses two evaluation functions to guide its search for a proof of whether or not a particular goal is achievable. Thirteen general features of predicate calculus clauses were created for use in the automatic learning of better evaluation functions for PP. A multiple regression program was used to produce optimal coefficients for linear polynomial functions in terms of the features.\par Also, automatic data-handling routines were written for passing data between the learning program and the proving program, and for analyzing and summarizing results. Data was generally collected for learning (regression analysis) from the experience of PP. A number of experiments were performed to test the effectiveness and generality of the learning program. Results showed that the learning produced dramatic improvements in the solutions to problems which were in the same domain as those used for collection learning data. Learning was also shown to generalize successfully to domains other than those used for data collection. Another experiment demonstrated that the learning program could simultaneously improve performance on problems in a specific domain and on problems in a variety of domains. Some variations of the learning program were also tested.", 3737 acknowledgement = ack-nhfb, 3738 classcodes = "C1230 (Artificial intelligence)", 3739 corpsource = "Nat. Inst. Health, Bethesda, MD, USA", 3740 keywords = "adaptive; artificial intelligence; automatic learning; computer aided instruction; computer aided learning; education; experimental development; heuristic; heuristic programming; heuristic tree searching program; learning; learning systems; LISP; multiple regression; multipurpose heuristic program; problem-solving; resolution; self-modifying; system; theorem-providing; tree-searching; trees; trees (mathematics)", 3741 treatment = "P Practical", 3742} 3743 3744@Article{Hurwitz:1971:PDV, 3745 author = "H. {Hurwitz, Jr.}", 3746 title = "On the Probability Distribution of the Values of Binary Trees", 3747 journal = j-CACM, 3748 volume = "14", 3749 number = "2", 3750 pages = "99--102", 3751 month = feb, 3752 year = "1971", 3753 CODEN = "CACMA2", 3754 ISSN = "0001-0782", 3755 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3756 bibsource = "Compendex database", 3757 abstract = "\ldots{}unction for binary tree values, the values reflecting sorting effort. The analysis does not assume uniformly distributed branching ratios, and therefore is applicable to a family of sorting algorithms discussed by Hoare, Singleton, and van Emden. \par The solution to the integral equation indicates that using more advanced algorithms in the family makes only minor reductions in the expected sorting effort, but substantially reduces the variance in sorting effort. Statistical tests of the values of several thousand trees containing up to 10,000 points have given first, second, and third moments of the value distribution function in satisfactory agreement with the moments computed from the generating function. The empirical tests, as well as the analytical results, are in agreement with previously published results for the first moment in the cases of uniform and nonuniform distribution of branching ratio, and for the second moment in the case of uniform distribution of branching ratio.", 3758 acknowledgement = ack-nhfb, 3759 classcodes = "C6130 (Data handling techniques)", 3760 corpsource = "General Electric, Schenectady, NY, USA", 3761 journalabr = "Commun ACM", 3762 keywords = "binary tree; binary trees; CACMA; generation; integral equation: function; integral equations; N T; probability distribution; sorting; statistical analysis; statistical tests; statistics; trees; trees (mathematics); values", 3763 treatment = "T Theoretical or Mathematical", 3764} 3765 3766@Article{Slagle:1971:AGT, 3767 author = "J. R. Slagle and R. C. T. Lee", 3768 title = "Application of Game Tree Searching Techniques to Sequential Pattern Recognition", 3769 journal = j-CACM, 3770 volume = "14", 3771 number = "2", 3772 pages = "103--110", 3773 month = feb, 3774 year = "1971", 3775 CODEN = "CACMA2", 3776 ISSN = "0001-0782", 3777 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3778 bibsource = "Compendex database", 3779 abstract = "A sequential pattern recognition (SPR) procedure does not test all the features of a pattern at once. Instead, it selects a feature to be tested. After receiving the result of that test, the procedure either classifies the unknown pattern or selects another feature to be tested, etc. Medical diagnosis is an example of SPR. In this paper the authors suggest that SPR be viewed as a one-person game played against nature (chance). Virtually all the powerful techniques developed for searching two-person, strictly competitive game trees can easily be incorporated either directly or by analogy into SPR procedures. \par In particular, one can incorporate the ``mini average backing-up procedure'' and the ``gamma procedure,'' which are the analogues of the ``minimax backing-up procedure'' and the ``alpha-beta procedure,'' respectively. \par Some computer simulated experiments in character recognition are presented. The results indicate that the approach is promising.", 3780 acknowledgement = ack-nhfb, 3781 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 3782 corpsource = "Nat. Inst. Health, Bethesda, MD, USA", 3783 journalabr = "Commun ACM", 3784 keywords = "bioengineering, computer applications; branch-and-bound approach; CACMA; CAL; computers, digital, character; dynamic programming; game against nature; game theory; game theory application; game tree searching; gamma procedure; mini average backing-up procedure; optimal solution; pattern; pattern recognition; pattern recognition systems; recognition; sequential pattern recognition; techniques; trees; trees (mathematics)", 3785 treatment = "P Practical", 3786} 3787 3788@Article{Rokne:1971:CIA, 3789 author = "J. Rokne and P. Lancaster", 3790 title = "Complex Interval Arithmetic", 3791 journal = j-CACM, 3792 volume = "14", 3793 number = "2", 3794 pages = "111--112", 3795 month = feb, 3796 year = "1971", 3797 CODEN = "CACMA2", 3798 ISSN = "0001-0782", 3799 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3800 bibsource = "Compendex database", 3801 abstract = "Complex interval arithmetic is defined using real interval arithmetic. Complex interval division is defined so as to assure smallest possible resulting intervals.", 3802 acknowledgement = ack-nhfb, 3803 classcodes = "C5230 (Digital arithmetic methods)", 3804 corpsource = "Univ. Calgary, Alta., Canada", 3805 journalabr = "Commun ACM", 3806 keywords = "complex interval arithmetic; complex intervals; digital arithmetic; mathematics; numerical mathematics; numerical methods; on; real interval arithmetic; real intervals", 3807 treatment = "T Theoretical or Mathematical", 3808} 3809 3810@Article{Dell:1971:AAR, 3811 author = "A. M. Dell and R. L. Weil and G. L. Thompson", 3812 title = "{ACM} Algorithm 405: Roots of Matrix Pencils: The Generalized Eigenvalue Problem", 3813 journal = j-CACM, 3814 volume = "14", 3815 number = "2", 3816 pages = "113--117", 3817 month = feb, 3818 year = "1971", 3819 CODEN = "CACMA2", 3820 ISSN = "0001-0782", 3821 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3822 acknowledgement = ack-nhfb, 3823 classcodes = "C4140 (Linear algebra); C7310 (Mathematics computing)", 3824 corpsource = "Univ. Chicago, IL, USA", 3825 keywords = "algebra; eigenvalues and eigenfunctions; generalised eigenvalue; linear; matrix algebra; problem; roots of matrix pencils; subroutines", 3826 treatment = "T Theoretical or Mathematical", 3827} 3828 3829@Article{Noll:1971:SCG, 3830 author = "A. M. Noll", 3831 title = "Scanned-Display Computer Graphics", 3832 journal = j-CACM, 3833 volume = "14", 3834 number = "3", 3835 pages = "143--150", 3836 month = mar, 3837 year = "1971", 3838 CODEN = "CACMA2", 3839 ISSN = "0001-0782", 3840 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3841 bibsource = "Compendex database", 3842 abstract = "A television-like scanned-display system has been successfully implemented on a Honeywell DDP-224 computer installation. The scanned image is stored in the core memory of the computer, and software scan conversion is used to convert the rectangular coordinates of a point to the appropriate work and bit in an output display array in core storage. Results thus far indicate that flicker-free displays of large amounts of data are possible with reasonably fast graphical interaction. A scanned image of size 240x254 points is displayed at a 30 frame-per-second rate.", 3843 acknowledgement = ack-nhfb, 3844 classcodes = "B7260 (Display technology and systems); C5540 (Terminals and graphic displays)", 3845 corpsource = "Bell Telephone Labs. Inc., Murray Hill, NJ, USA", 3846 journalabr = "Commun ACM", 3847 keywords = "CACMA; computer; computer graphics; computers, digital; core memory; display systems; ed.; graphical interaction; installation; raster displays; scan conversion; scanned image; software; stored; television like scanned display", 3848 treatment = "A Application; P Practical", 3849} 3850 3851@Article{Manna:1971:TAP, 3852 author = "Z. Manna and R. J. Waldinger", 3853 title = "Toward Automatic Program Synthesis", 3854 journal = j-CACM, 3855 volume = "14", 3856 number = "3", 3857 pages = "151--165", 3858 month = mar, 3859 year = "1971", 3860 CODEN = "CACMA2", 3861 ISSN = "0001-0782", 3862 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3863 bibsource = "Compendex database", 3864 abstract = "An elementary outline of the theorem-proving approach to automatic program synthesis is given, without dwelling on technical details. The method is illustrated by the automatic construction of both recursive and iterative programs operating on natural numbers,lists, and trees, In order to construct a program satisfying certain specifications a theorem induced by those specifications is proved, and the desired program is extracted from the proof. The same technique is applied to transform recursively defined functions into iterative programs, frequently with a major gain inefficiency. It is emphasized that in order to construct a program with loops or with recursion, the principle of mathematical induction must be applied. The relation between the version of the induction rule used and the form of the program constructed is explored in some detail.", 3865 acknowledgement = ack-nhfb, 3866 classcodes = "C1230 (Artificial intelligence)", 3867 corpsource = "Stanford Univ., CA, USA", 3868 journalabr = "Commun ACM", 3869 keywords = "answer extraction; artificial; artificial intelligence; automata theory; automatic program synthesis; CACMA; computer metatheory; computers, languages; computers, programming; intelligence; lists; mathematical induction; mathematical induction principle; natural numbers; principle; problem solving; programs; recursive and iterative; theorem proving; trees", 3870 treatment = "P Practical", 3871} 3872 3873@Article{Winters:1971:SAC, 3874 author = "W. K. Winters", 3875 title = "Scheduling Algorithm for a Computer Assisted Registration System", 3876 journal = j-CACM, 3877 volume = "14", 3878 number = "3", 3879 pages = "166--171", 3880 month = mar, 3881 year = "1971", 3882 CODEN = "CACMA2", 3883 ISSN = "0001-0782", 3884 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3885 bibsource = "Compendex database", 3886 abstract = "This paper presents the scheduling algorithm used in the Computer Assisted Registration System at the University of Tennessee. Notation is defined and the logic of the algorithm necessary to implement educational policy is described. Results from the first term's implementation are presented.", 3887 acknowledgement = ack-nhfb, 3888 classcodes = "C7110 (Educational administration)", 3889 corpsource = "Univ. Tennessee, Knoxville, TN, USA", 3890 journalabr = "Commun ACM", 3891 keywords = "administrative data processing; CACMA; computer assisted registration system; data processing; educational administrative data processing; educational policy; implementation; logic; scheduling algorithm; timetable", 3892 treatment = "A Application; P Practical", 3893} 3894 3895@Article{Williams:1971:SUM, 3896 author = "J. G. Williams", 3897 title = "Storage Utilization in a Memory Hierarchy When Storage Assignment is Performed by a Hashing Algorithm", 3898 journal = j-CACM, 3899 volume = "14", 3900 number = "3", 3901 pages = "172--175", 3902 month = mar, 3903 year = "1971", 3904 CODEN = "CACMA2", 3905 ISSN = "0001-0782", 3906 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3907 bibsource = "Compendex database", 3908 abstract = "The utilization of storage is studied in a two-level memory hierarchy. The first storage level, which is the fast store, is divided into a number of storage areas. When an entry is to be filed in the hierarchy, a hashing algorithm will attempt to place the entry into one of these areas. If this particular area is full, then the entry will be placed into the slower second-level store, even though other areas in the first-level store may have space available. Given that N entries have been filed in the entire hierarchy, an expression is derived for the expected number of entries filed in the first-level store. This expression gives a measure of how effectively the first-level store is being used. By means of examples, storage utilization is then studied as a function of the hashing algorithm, the number of storage areas into which the first-level store is divided and the total size of the first-level store.", 3909 acknowledgement = ack-nhfb, 3910 classcodes = "C6120 (File organisation)", 3911 corpsource = "RCA Labs., Princeton, NJ, USA", 3912 journalabr = "Commun ACM", 3913 keywords = "CACMA; computers, digital; hashing algorithm; hierarchical systems; memory allocation; memory hierarchy; storage allocation; storage assignment; storage units; storage utilization", 3914 treatment = "A Application; P Practical", 3915} 3916 3917@Article{Gear:1971:AIO, 3918 author = "C. W. Gear", 3919 title = "The Automatic Integration of Ordinary Differential Equations", 3920 journal = j-CACM, 3921 volume = "14", 3922 number = "3", 3923 pages = "176--179", 3924 month = mar, 3925 year = "1971", 3926 CODEN = "CACMA2", 3927 ISSN = "0001-0782", 3928 MRclass = "65L05", 3929 MRnumber = "52 9612", 3930 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3931 bibsource = "Compendex database", 3932 abstract = "A criterion for the selection of the order of approximation is proposed. The objective of the criterion is to increase the step size so as to reduce solution time. An option permits the solution of `stiff' differential equations. A program embodying the techniques discussed appears as an algorithm which is specified.", 3933 acknowledgement = ack-nhfb, 3934 classcodes = "C4170 (Differential equations)", 3935 corpsource = "Stanford Univ., CA, USA", 3936 journalabr = "Commun ACM", 3937 keywords = "automatic; boundary value problems; boundary-value problems; CACMA; differential equations; initial value; integration; mathematics; numerical methods; order control; order of approximation; ordinary differential equations; problem; selection; step control; stiff equations", 3938 treatment = "T Theoretical or Mathematical", 3939} 3940 3941@Article{Howell:1971:AAE, 3942 author = "J. A. Howell", 3943 title = "{ACM} Algorithm 406: Exact Solution of Linear Equations Using Residue Arithmetic", 3944 journal = j-CACM, 3945 volume = "14", 3946 number = "3", 3947 pages = "180--184", 3948 month = mar, 3949 year = "1971", 3950 CODEN = "CACMA2", 3951 ISSN = "0001-0782", 3952 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3953 acknowledgement = ack-nhfb, 3954 classcodes = "C7310 (Mathematics computing)", 3955 corpsource = "Univ. Texas, Austin, TX, USA", 3956 keywords = "adjoint matrix; determinant; Gaussian elimination; ill condition; inversion; linear equations; matrix; matrix algebra; modulus; prime number; residue arithmetic; subroutine; subroutines; symmetric mixed radix representation; symmetric residue", 3957 treatment = "T Theoretical or Mathematical", 3958} 3959 3960@Article{Gear:1971:AAD, 3961 author = "C. W. Gear", 3962 title = "{ACM} Algorithm 407: {DIFSUB} for Solution of Ordinary Differential Equations", 3963 journal = j-CACM, 3964 volume = "14", 3965 number = "3", 3966 pages = "185--190", 3967 month = mar, 3968 year = "1971", 3969 CODEN = "CACMA2", 3970 ISSN = "0001-0782", 3971 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3972 acknowledgement = ack-nhfb, 3973 classcodes = "C7310 (Mathematics computing)", 3974 corpsource = "Univ. Illinois, Urbana, IL, USA", 3975 keywords = "control; differential equations; DIFSUB; estimated error; method; multistep predictor corrector; ordinary differential equations; stiff differential equations; subroutine; subroutines", 3976 treatment = "T Theoretical or Mathematical", 3977} 3978 3979@Article{Wirth:1971:PDS, 3980 author = "N. Wirth", 3981 title = "Program Development by Stepwise Refinement", 3982 journal = j-CACM, 3983 volume = "14", 3984 number = "4", 3985 pages = "221--227", 3986 month = apr, 3987 year = "1971", 3988 CODEN = "CACMA2", 3989 ISSN = "0001-0782", 3990 bibdate = "Tue Mar 25 13:26:09 MST 1997", 3991 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/conc.scientific.computing.bib", 3992 acknowledgement = ack-nhfb, 3993 classcodes = "C6110 (Systems analysis and programming)", 3994 corpsource = "Eidgenossische Tech. Hochschule, Zurich, Switzerland", 3995 keywords = "development; education; programming; programming techniques; refinement; stepwise", 3996 treatment = "P Practical", 3997} 3998 3999@Article{Lum:1971:KAT, 4000 author = "V. Y. Lum and P. S. T. Yuen and M. Dodd", 4001 title = "Key-to-Address Transform Techniques: {A} Fundamental Performance Study on Large Existing Formatted Files", 4002 journal = j-CACM, 4003 volume = "14", 4004 number = "4", 4005 pages = "228--239", 4006 month = apr, 4007 year = "1971", 4008 CODEN = "CACMA2", 4009 ISSN = "0001-0782", 4010 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4011 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib", 4012 note = "Survey of several hash functions, with performance results.", 4013 abstract = "The results of a study of eight different keyto-address transformation methods applied to a set of existing files are presented. As each method is applied to a particular file, load factor and bucket size are varied over a wide range. Appropriate variables pertinent only to a specific method take on different values. The performance of each method is summarized in terms of the number of accesses required to get to a record and the number of overflow records created by a transformation. Peculiarities of each method are discussed. Practical guidelines obtained from the results are stated. A proposal for further quantitative fundamental study is outlined.", 4014 acknowledgement = ack-nhfb, 4015 annote = "Measurement of direct access methods", 4016 classcodes = "C6120 (File organisation)", 4017 corpsource = "IBM, San Jose, CA, USA", 4018 journalabr = "Commun ACM", 4019 keywords = "CACMA; computers, digital; computers, digital codes; file organization; has codes; information storage and retrie; random access storage", 4020 keywords = "file management; file organisation; file organization; formatted files; information retrieval; key to address transform; techniques", 4021 treatment = "P Practical", 4022} 4023 4024@Article{Tucker:1971:DMP, 4025 author = "A. B. Tucker and M. J. Flynn", 4026 title = "Dynamic Microprogramming. Processor Organization and Programming", 4027 journal = j-CACM, 4028 volume = "14", 4029 number = "4", 4030 pages = "240--250", 4031 month = apr, 4032 year = "1971", 4033 CODEN = "CACMA2", 4034 ISSN = "0001-0782", 4035 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4036 bibsource = "Compendex database", 4037 abstract = "A microassembly language is developed and the overhead involved in subroutine linkages is analyzed. The efficiency of a flexible software linkage scheme is examined as to its overhead for various subroutine characteristics. Three examples of problem-oriented programming are considered and the resulting coding is compared against a System/360 assembly language version, with the technology normalized.", 4038 acknowledgement = ack-nhfb, 4039 classcodes = "C6150C (Compilers, interpreters and other processors)", 4040 corpsource = "Northwestern Univ., Evanston, IL, USA", 4041 journalabr = "Commun ACM", 4042 keywords = "CACMA; computers, digital; dynamically microprogrammed processor; microassembly language; microprogramming; microstorage; problem oriented programming; problem-oriented languages; program processors; read write; subroutine linkage", 4043 treatment = "P Practical", 4044} 4045 4046@Article{Talbot:1971:AOT, 4047 author = "P. A. Talbot and J. W. Carr and R. R. {Coulter, Jr.} and R. C. Hwang", 4048 title = "Animator: an on-line two-dimensional film animation system", 4049 journal = j-CACM, 4050 volume = "14", 4051 number = "4", 4052 pages = "251--259", 4053 month = apr, 4054 year = "1971", 4055 CODEN = "CACMA2", 4056 ISSN = "0001-0782", 4057 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4058 acknowledgement = ack-nhfb, 4059 classcodes = "C5540 (Terminals and graphic displays)", 4060 corpsource = "Univ. Pennsylvania, Philadelphia, PA, USA", 4061 keywords = "computer animation; computer graphics; dimensional languages; microfilm recorder; on line system; online operation; programming languages; two", 4062 treatment = "P Practical", 4063} 4064 4065@Article{Stein:1971:CD, 4066 author = "M. L. Stein and W. D. Munro", 4067 title = "On Complement Division", 4068 journal = j-CACM, 4069 volume = "14", 4070 number = "4", 4071 pages = "260--264", 4072 month = apr, 4073 year = "1971", 4074 CODEN = "CACMA2", 4075 ISSN = "0001-0782", 4076 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4077 bibsource = "Compendex database", 4078 abstract = "The division algorithm theorem is expressed in a form that permits it to serve as the basis for devising division operations that produce both quotient and remainder in complement form. Algorithms for division yielding complement results are derived for numbers represented in any base greater than one. Both radix and radix-less-one complementation schemes are considered. The binary form of the algorithms thus includes both two's and one's complement implementation. The problem of quotient overflow for complement results is dealt with as is that of selecting an appropriate form of the remainder condition for complement division.", 4079 acknowledgement = ack-nhfb, 4080 classcodes = "C4210 (Formal logic)", 4081 corpsource = "Univ. Minnesota, Minneapolis, MN, USA", 4082 journalabr = "Commun ACM", 4083 keywords = "algorithmic languages; CACMA; complement; digital arithmetic; division; division algorithm; mathematics; radix complementation schemes", 4084 treatment = "P Practical", 4085} 4086 4087@Article{McNamee:1971:AAS, 4088 author = "J. M. McNamee", 4089 title = "{ACM} Algorithm 408: {A} Sparse Matrix Package (Part {I})", 4090 journal = j-CACM, 4091 volume = "14", 4092 number = "4", 4093 pages = "265--273", 4094 month = apr, 4095 year = "1971", 4096 CODEN = "CACMA2", 4097 ISSN = "0001-0782", 4098 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4099 note = "See also \cite{Sipala:1977:RAS,Gustavson:1978:RAS,Harms:1980:RSM}.", 4100 acknowledgement = ack-nhfb, 4101 classcodes = "C7410B (Power engineering computing)", 4102 corpsource = "York Univ., Downsview, Ont., Canada", 4103 keywords = "algebra; electrical engineering applications of computers; electrical network problems; Fortran subroutines; matrix; sparse matrix manipulation; subroutines; tests", 4104 treatment = "P Practical", 4105} 4106 4107@Article{Olle:1971:IFA, 4108 author = "T. William {Olle (Chairman)} and {Codasyl Systems Committee}", 4109 title = "Introduction to {`Feature analysis of generalized data base management systems'}", 4110 journal = j-CACM, 4111 volume = "14", 4112 number = "5", 4113 pages = "308--318", 4114 month = may, 4115 year = "1971", 4116 CODEN = "CACMA2", 4117 ISSN = "0001-0782", 4118 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4119 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 4120 abstract = "This introduction gives a review of the current state of the art in the systems and discusses the differences and similarities between capabilities found in host language systems and those found in self-contained systems. Technical problems facing future designers are described. The use of Cobol as a basis for further development work is considered at some length with respect to data structures, host language capabilities, and self-contained capabilities.", 4121 acknowledgement = ack-nhfb, 4122 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 4123 keywords = "data structures; feature analysis; generalised data base management systems; information; programming languages; retrieval; standards; storage management; transaction processing", 4124} 4125 4126@Article{Nielsen:1971:MRC, 4127 author = "N. R. Nielsen", 4128 title = "The merit of regional computing networks", 4129 journal = j-CACM, 4130 volume = "14", 4131 number = "5", 4132 pages = "319--326", 4133 month = may, 4134 year = "1971", 4135 CODEN = "CACMA2", 4136 ISSN = "0001-0782", 4137 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4138 bibsource = "Compendex database", 4139 abstract = "One of the suggested means for stimulating the spread of computing capabilities in institutions of higher learning is through the construction of regional computing networks. One such network has been constructed in the San Francisco Bay Area of Stanford University. This paper reports upon the lessons learned from the operation of that network over the past 2 yr.", 4140 acknowledgement = ack-nhfb, 4141 classcodes = "C0220 (Computing education and training); C5600 (Data communication equipment and techniques); C7810C (Computer-aided instruction)", 4142 corpsource = "Stanford Univ., CA, USA", 4143 journalabr = "Commun ACM", 4144 keywords = "CACMA; computer aided instruction; computer applications; computer sharing; computer utility; computers, digital, data proce; computing; cooperative networks; curriculum development; digital communication systems; education; educational computing; engineering education; R C; remote", 4145} 4146 4147@Article{Krolak:1971:MAT, 4148 author = "P. Krolak and W. Felts and G. Marble", 4149 title = "A Man-Machine Approach Toward Solving the Traveling Salesman Problem", 4150 journal = j-CACM, 4151 volume = "14", 4152 number = "5", 4153 pages = "327--334", 4154 month = may, 4155 year = "1971", 4156 CODEN = "CACMA2", 4157 ISSN = "0001-0782", 4158 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4159 bibsource = "Compendex database", 4160 abstract = "This paper describes a computer aided heuristic technique which uses only a modest amount of computer time in real-time to solve large (100 to 200) point problems. This technique takes advantage of both the computer's and the human's problem-solving abilities. The computer is not asked to solve the problem in a brute force way as in many of today's heuristics, but it is asked to organize the data for the human so that the human can solve the problem easily. The technique used in this paper seems to point to new directions in the field of man-machine interaction and in the field of artificial intelligence.", 4161 acknowledgement = ack-nhfb, 4162 classcodes = "C1230 (Artificial intelligence); C1270 (Man-machine systems)", 4163 corpsource = "Vanderbilt Univ., Nashville, TN, USA", 4164 journalabr = "Commun ACM", 4165 keywords = "artificial intelligence; assignment; CACMA; computer aided heuristic techniques; computer applications; cybernetics; heuristic procedure; heuristic programming; interaction process; man machine interaction; man-machine systems; operations research; optimisation; problem; production planning and control; rubber band tour generator; travelling salesman problem", 4166 treatment = "T Theoretical or Mathematical", 4167} 4168 4169@Article{Montanari:1971:ODC, 4170 author = "Ugo Montanari", 4171 title = "On the optimal detection of curves in noisy pictures", 4172 journal = j-CACM, 4173 volume = "14", 4174 number = "5", 4175 pages = "335--345", 4176 month = may, 4177 year = "1971", 4178 CODEN = "CACMA2", 4179 ISSN = "0001-0782", 4180 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4181 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/Reverse.eng.bib", 4182 acknowledgement = ack-nhfb, 4183 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 4184 corpsource = "Istituto Elaborazione Informazione, Pisa, Italy", 4185 keywords = "curve; description; dynamic programming; edge; global recognition; heuristic; heuristic programming; interaction graph; line; methods; noise; optimal detection; optimisation; optimisation problem; parallel processing; pattern recognition; picture; picture processing; picture recognition; secondary", 4186 treatment = "T Theoretical or Mathematical", 4187} 4188 4189@Article{Richards:1971:HKA, 4190 author = "D. L. Richards", 4191 title = "How to Keep the Addresses Short", 4192 journal = j-CACM, 4193 volume = "14", 4194 number = "5", 4195 pages = "346--349", 4196 month = may, 4197 year = "1971", 4198 CODEN = "CACMA2", 4199 ISSN = "0001-0782", 4200 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4201 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib", 4202 abstract = "This paper demonstrates that a wide class of problems can be formulated as covering problems solvable by means of elementary arithmetic operations on the column vectors of a ternary matrix.", 4203 acknowledgement = ack-nhfb, 4204 classcodes = "C6130 (Data handling techniques); C6150C (Compilers, interpreters and other processors)", 4205 corpsource = "Leasco Systems Corp., Tustin, CA, USA", 4206 journalabr = "Commun ACM", 4207 keywords = "addressing; assembler; CACMA; compilers; computers, digital; covering problem; data handling; integer; integer programming; minimisation; program; program assemblers; programming; variable length addressing", 4208 treatment = "T Theoretical or Mathematical", 4209} 4210 4211@Article{Fenichel:1971:ILV, 4212 author = "R. R. Fenichel", 4213 title = "On Implementation of Label Variables", 4214 journal = j-CACM, 4215 volume = "14", 4216 number = "5", 4217 pages = "349--350", 4218 month = may, 4219 year = "1971", 4220 CODEN = "CACMA2", 4221 ISSN = "0001-0782", 4222 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4223 bibsource = "Compendex database", 4224 abstract = "Variables of label mode are conventionally implemented with a technique which fails to trap certain programming errors. Fine-grained calender clocks have recently become available; these allow implementation of label variables via a new technique which traps all programming errors of this variety.", 4225 acknowledgement = ack-nhfb, 4226 classcodes = "C6150C (Compilers, interpreters and other processors)", 4227 corpsource = "MIT, Cambridge, MA, USA", 4228 journalabr = "Commun ACM", 4229 keywords = "CACMA; compiler; computers, digital; DS; fine grained calendar clocks; go; interpreter; label variables implementation; program compilers; program debugging; to; transfer", 4230 treatment = "P Practical", 4231} 4232 4233@Article{Morris:1971:ARI, 4234 author = "James H. {Morris, Jr.}", 4235 title = "Another Recursion Induction Principle", 4236 journal = j-CACM, 4237 volume = "14", 4238 number = "5", 4239 pages = "351--354", 4240 month = may, 4241 year = "1971", 4242 CODEN = "CACMA2", 4243 ISSN = "0001-0782", 4244 MRclass = "02F25 (94A25)", 4245 MRnumber = "45 57", 4246 mrreviewer = "H. R. Strong", 4247 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4248 bibsource = "Compendex database", 4249 abstract = "An inductive method for proving things about recursively defined functions is described. It is shown to be useful for proving partial functions equivalent and thus applicable in proofs about interpreters for programming languages.", 4250 acknowledgement = ack-nhfb, 4251 classcodes = "C1230 (Artificial intelligence); C4210 (Formal logic)", 4252 corpsource = "Univ. California, Berkeley, CA, USA", 4253 journalabr = "Commun ACM", 4254 keywords = "automata theory; CACMA; compiler correctness; compiler correctness proofs; computational linguistics; computers, digital, languages; computers, digital, programming; correctness; induction; interpreters; proofs; proving; recursion; recursion induction principle; recursive functions; theorem", 4255 treatment = "T Theoretical or Mathematical", 4256} 4257 4258@Article{Schmitt:1971:AAD, 4259 author = "H. Schmitt", 4260 title = "{ACM} Algorithm 409: Discrete {Chebychev} Curve Fit", 4261 journal = j-CACM, 4262 volume = "14", 4263 number = "5", 4264 pages = "355--356", 4265 month = may, 4266 year = "1971", 4267 CODEN = "CACMA2", 4268 ISSN = "0001-0782", 4269 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4270 acknowledgement = ack-nhfb, 4271 classcodes = "C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 4272 corpsource = "Tech. Hochschule, Darmstadt, West Germany", 4273 keywords = "ALGOL procedure; algorithm; Chebyshev approximation; discrete Chebychev curve fit; exchange; Remez algorithm; subroutines", 4274 treatment = "T Theoretical or Mathematical", 4275} 4276 4277@Article{Chambers:1971:AAP, 4278 author = "J. M. Chambers", 4279 title = "{ACM} Algorithm 410: Partial Sorting [{M1}]", 4280 journal = j-CACM, 4281 volume = "14", 4282 number = "5", 4283 pages = "357--358", 4284 month = may, 4285 year = "1971", 4286 CODEN = "CACMA2", 4287 ISSN = "0001-0782", 4288 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4289 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/acm.bib", 4290 acknowledgement = ack-nhfb, 4291 classcodes = "C6130 (Data handling techniques)", 4292 corpsource = "Bell Telephone Labs., Murray Hill, NJ, USA", 4293 keywords = "FORTRAN routine; order statistics; partial sorting; sorting; subroutines", 4294 keywords = "partial sorting order statistics; sorting", 4295 treatment = "T Theoretical or Mathematical", 4296} 4297 4298@Article{Harada:1971:GRP, 4299 author = "Kazuaki Harada", 4300 title = "Generation of rosary permutations expressed in {Hamiltonian} circuits", 4301 journal = j-CACM, 4302 volume = "14", 4303 number = "6", 4304 pages = "373--379", 4305 month = jun, 4306 year = "1971", 4307 CODEN = "CACMA2", 4308 ISSN = "0001-0782", 4309 MRclass = "90.30 (05.00)", 4310 MRnumber = "44\#3675", 4311 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4312 abstract = "Systematic generation of a specific class of permutations fundamental to scheduling problems is described. In a nonoriented complete graph with n vertices, Hamiltonian circuits equivalent to $.5(n - 1)!$ specific permutations of $n$ elements, termed rosary permutations, can be defined. Each of them corresponds to two circular permutations which mirror-image each other, and is generated successively by a number system covering $3*4*\ldots*(n-1)$ sets of edges. Every set of edges $\{E[k]\}, 1 <= E[k] <= k, 3 <= k <= (n-1)$ is determined recursively by constructing a Hamiltonian circuit with $k$ vertices from a Hamiltonian circuit with $k-1$ vertices, starting with the Hamiltonian circuit of 3 vertices. The basic operation consists of transposition of a pair of adjacent vertices where the position of the pair in the permutation is determined by $\{E[k]\}$. Two algorithms treating the same example for five vertices are presented. It is very easy to derive all possible n! permutations from the $.5(n - 1 )!$ rosary permutations be cycling the permutations and by taking them in the reverse order-procedures which can be performed fairly efficiently by computer.", 4313 acknowledgement = ack-nhfb, 4314 classcodes = "B0250 (Combinatorial mathematics)", 4315 corpsource = "Washington Univ., St. Louis, MO, USA", 4316 keywords = "circuits; combinatorial algebra; graph theory; Hamiltonian; nonoriented complete graph; permutation; rosary permutations generation; scheduling", 4317 treatment = "T Theoretical or Mathematical", 4318} 4319 4320@Article{Foley:1971:AOD, 4321 author = "J. D. Foley", 4322 title = "An approach to the optimum design of computer graphics systems", 4323 journal = j-CACM, 4324 volume = "14", 4325 number = "6", 4326 pages = "380--390", 4327 month = jun, 4328 year = "1971", 4329 CODEN = "CACMA2", 4330 ISSN = "0001-0782", 4331 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4332 acknowledgement = ack-nhfb, 4333 classcodes = "C4290 (Other computer theory)", 4334 corpsource = "Univ. North Carolina, Chapel Hill, NC, USA", 4335 keywords = "average response time prediction; computer graphics; computer graphics systems; computer metatheory; mathematical; model; optimisation; optimum design", 4336 treatment = "T Theoretical or Mathematical", 4337} 4338 4339@Article{Amarel:1971:CSC, 4340 author = "S. Amarel", 4341 title = "Computer Science: {A} Conceptual Framework for Curriculum Planning", 4342 journal = j-CACM, 4343 volume = "14", 4344 number = "6", 4345 pages = "391--401", 4346 month = jun, 4347 year = "1971", 4348 CODEN = "CACMA2", 4349 ISSN = "0001-0782", 4350 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4351 abstract = "Two views of computer science are considered: a global view which attempts to capture broad characteristics of the field and its relationships to other fields, and a local view which focuses on the inner structure of the field. This structure is presented in terms of the kinds of knowledge, problems, and activities that exist within the discipline, as well as the relations between them. An approach to curriculum planning in computer science is presented which is guided by the structure of the field, by the fact that change is an important feature of the situation, and by the expectation that computer science will continue to increase its working contacts with other disciplines.", 4352 acknowledgement = ack-nhfb, 4353 classcodes = "C0220 (Computing education and training)", 4354 corpsource = "Rutgers Univ., New Brunswick, NJ, USA", 4355 keywords = "computer science; curriculum planning; education", 4356 treatment = "G General Review", 4357} 4358 4359@Article{Bosarge:1971:NPR, 4360 author = "W. E. {Bosarge, Jr.} and O. G. Johnson", 4361 title = "Numerical properties of the {Ritz-Trefftz} algorithm for optimal control", 4362 journal = j-CACM, 4363 volume = "14", 4364 number = "6", 4365 pages = "402--406", 4366 month = jun, 4367 year = "1971", 4368 CODEN = "CACMA2", 4369 ISSN = "0001-0782", 4370 MRclass = "65.30", 4371 MRnumber = "44\#7714", 4372 mrreviewer = "A. Pasquali", 4373 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4374 abstract = "In this paper the Ritz-Trefftz algorithm is applied to the computer solution of the state regulator problem. The algorithm represents a modification of the Ritz direct method and is designed to improve the speed of solution and the storage requirements to the point where real-time implementation becomes feasible. The modification is shown to be more stable computationally than the traditional Ritz approach. \par The first concern of the paper is to describe the algorithm and establish its properties as a valid and useful numerical technique. In particular such useful properties as definiteness and reasonableness of condition are established for the method. The second part of the paper is devoted to a comparison of the new techniques with the standard procedure of numerically integrating a matrix Riccati equation to determine a feedback matrix. The new technique is shown to be significantly faster for comparable accuracy.", 4375 acknowledgement = ack-nhfb, 4376 classcodes = "C1330 (Optimal control); C4190 (Other numerical methods)", 4377 corpsource = "IBM Sci. Center, Houston, TX, USA", 4378 keywords = "control theory; equation; feedback matrix; matrix Riccati; numerical; numerical analysis; numerical integration; numerical methods; optimal control; properties; regulator problem; Ritz Trefftz algorithm; splines; state regulator problem", 4379 treatment = "T Theoretical or Mathematical", 4380} 4381 4382@Article{Gladwin:1971:NCF, 4383 author = "H. Tim Gladwin", 4384 title = "A Note on Compiling Fixed Point Binary Multiplications", 4385 journal = j-CACM, 4386 volume = "14", 4387 number = "6", 4388 pages = "407--408", 4389 month = jun, 4390 year = "1971", 4391 CODEN = "CACMA2", 4392 ISSN = "0001-0782", 4393 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4394 abstract = "An algorithm is developed for compiling, as a sequence of shifts, additions,and subtractions, many fixed point binary multiplications involving a constant. The most significant characteristics of the algorithm are the simplicity of the test which determines if the algorithm should be applied and the degree to which it ``suggests'' efficient object code.", 4395 acknowledgement = ack-nhfb, 4396 classcodes = "C5230 (Digital arithmetic methods)", 4397 corpsource = "Univ. Washington, Seattle, WA, USA", 4398 keywords = "additions; compiling fixed point binary multiplications; compiling multiplications; digital arithmetic; fixed point arithmetic; program compilers; shifts; subtractions", 4399 treatment = "T Theoretical or Mathematical", 4400} 4401 4402@Article{Fraser:1971:MNP, 4403 author = "A. G. Fraser", 4404 title = "On the Meaning of Names in Programming Systems", 4405 journal = j-CACM, 4406 volume = "14", 4407 number = "6", 4408 pages = "409--416", 4409 month = jun, 4410 year = "1971", 4411 CODEN = "CACMA2", 4412 ISSN = "0001-0782", 4413 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4414 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib", 4415 acknowledgement = ack-nhfb, 4416 classcodes = "C4210 (Formal logic)", 4417 corpsource = "Bell Telephone Labs. Inc., Murray Hill, NJ, USA", 4418 keywords = "computational linguistics; context manipulation; data names; file; functional; lambda calculus; names; operating system; operating systems (computers); programming; programming systems; programming theory; theory", 4419 treatment = "G General Review", 4420} 4421 4422@Article{Walker:1971:BS, 4423 author = "R. J. Walker", 4424 title = "Binary summation", 4425 journal = j-CACM, 4426 volume = "14", 4427 number = "6", 4428 pages = "417--417", 4429 month = jun, 4430 year = "1971", 4431 CODEN = "CACMA2", 4432 ISSN = "0001-0782", 4433 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4434 acknowledgement = ack-nhfb, 4435 classcodes = "C5230 (Digital arithmetic methods)", 4436 corpsource = "Cornell Univ., Ithaca, NY, USA", 4437 keywords = "binary summation; digital arithmetic; floating point; roundoff errors; space; storage", 4438 treatment = "T Theoretical or Mathematical", 4439} 4440 4441@Article{Zelkowitz:1971:IDP, 4442 author = "M. Zelkowitz", 4443 title = "Interrupt driven programming", 4444 journal = j-CACM, 4445 volume = "14", 4446 number = "6", 4447 pages = "417--418", 4448 month = jun, 4449 year = "1971", 4450 CODEN = "CACMA2", 4451 ISSN = "0001-0782", 4452 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4453 acknowledgement = ack-nhfb, 4454 classcodes = "C5220 (Computer architecture)", 4455 corpsource = "Cornell Univ., Ithaca, NY, USA", 4456 keywords = "associative; control; debugging; interrupt drive programming; memories; microprogramming; parallel processing; program execution", 4457 treatment = "P Practical", 4458} 4459 4460@Article{McKenney:1971:SCO, 4461 author = "J. L. McKenney and F. M. Tonge", 4462 title = "The State of Computer-Oriented Curricula in Business Schools 1970", 4463 journal = j-CACM, 4464 volume = "14", 4465 number = "7", 4466 pages = "443--448", 4467 month = jul, 4468 year = "1971", 4469 CODEN = "CACMA2", 4470 ISSN = "0001-0782", 4471 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4472 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 4473 acknowledgement = ack-nhfb, 4474 classcodes = "C0220 (Computing education and training)", 4475 corpsource = "Harvard Univ., Cambridge, MA, USA", 4476 keywords = "business schools; computer curricula; education; reviews", 4477 treatment = "G General Review", 4478} 4479 4480@Article{Bernstein:1971:PTP, 4481 author = "A. J. Bernstein", 4482 title = "A programmer training project", 4483 journal = j-CACM, 4484 volume = "14", 4485 number = "7", 4486 pages = "449--452", 4487 month = jul, 4488 year = "1971", 4489 CODEN = "CACMA2", 4490 ISSN = "0001-0782", 4491 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4492 acknowledgement = ack-nhfb, 4493 classcodes = "C0220 (Computing education and training)", 4494 corpsource = "General Electric Res. and Dev. Center, Schenectady, NY, USA", 4495 keywords = "black; course organisation; curriculum; jobs; programmer training project; programming; residents; training", 4496 treatment = "G General Review", 4497} 4498 4499@Article{DeRemer:1971:SLK, 4500 author = "Franklin L. DeRemer", 4501 title = "Simple {LR(k)} grammars", 4502 journal = j-CACM, 4503 volume = "14", 4504 number = "7", 4505 pages = "453--460", 4506 month = jul, 4507 year = "1971", 4508 CODEN = "CACMA2", 4509 ISSN = "0001-0782", 4510 MRclass = "68A30", 4511 MRnumber = "47 9893", 4512 mrreviewer = "J. E. L. Peck", 4513 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4514 abstract = "A class of context-free grammars, called the ``Simple LR(k)'' or SLR(k) grammars is defined.\par This class has been shown to include weak precedence and simple precedence grammars as proper subsets. \par How to construct parsers for the SLR(k) grammars is also shown. These parser-construction techniques are extendible to cover all of the LR(k) grammars of Knuth; they have been implemented and by direct comparison proved to be superior to precedence techniques, not only in the range of grammars covered, but also in the speed of parser construction and in the size and speed of the resulting parsers.", 4515 acknowledgement = ack-nhfb, 4516 classcodes = "C4210 (Formal logic)", 4517 corpsource = "Univ. of California, Santa Cruz, CA, USA", 4518 keywords = "context-free grammar; deterministic pushdown automaton; finite-state machine; LR(k) grammar; parser; parsing algorithm; precedence grammar; syntactic analysis", 4519 keywords = "context free grammars; context-free grammars; grammars; parser construction; precedence; simple LR(K) grammars", 4520 treatment = "T Theoretical or Mathematical", 4521} 4522 4523@Article{Pratt:1971:LEG, 4524 author = "Terrence W. Pratt and Daniel P. Friedman", 4525 title = "A Language Extension for Graph Processing, and Its Formal Semantics", 4526 journal = j-CACM, 4527 volume = "14", 4528 number = "7", 4529 pages = "460--467 (or 461--467??)", 4530 month = jul, 4531 year = "1971", 4532 CODEN = "CACMA2", 4533 ISSN = "0001-0782", 4534 MRclass = "68A30", 4535 MRnumber = "46 6657", 4536 mrreviewer = "A. D. Booth", 4537 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4538 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Ai/lisp.bib", 4539 acknowledgement = ack-nhfb, 4540 classcodes = "C6140D (High level languages)", 4541 corpsource = "Univ. Texas, Austin, TX, USA", 4542 keywords = "data structure; directed graph; flowchart; formal semantics; graph processing; Graspe; language extension; Lisp; problem oriented languages; syntax", 4543 treatment = "T Theoretical or Mathematical", 4544} 4545 4546@Article{Paton:1971:ABC, 4547 author = "Keith Paton", 4548 title = "An algorithm for the blocks and cut nodes of a graph", 4549 journal = j-CACM, 4550 volume = "14", 4551 number = "7", 4552 pages = "468--475", 4553 month = jul, 4554 year = "1971", 4555 CODEN = "CACMA2", 4556 ISSN = "0001-0782", 4557 MRclass = "05-04", 4558 MRnumber = "46 5135", 4559 mrreviewer = "E. M. Reingold", 4560 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4561 note = "See corrigendum \cite{Paton:1971:CAB}.", 4562 abstract = "An efficient method is presented for finding blocks and cutnodes of an arbitrary undirected graph. The graph may be represented either (i) as an ordered list of edges or (ii) as a packed adjacency matrix. If $w$ denotes the word length of the machine employed, the storage (in machine words) required for a graph with $n$ nodes and $m$ edges increases essentially as $2(m+n)$ in case (i), or $(n^2)/w$ in case (ii). A spanning tree with labeled edges is grown, two edges finally bearing different labels if and only if they belong to different blocks. For both representations the time required to analyze a graph on $n$ nodes increases as $n^G$ where $G$ depends on the type of graph, $1 <= G <= 2$, and both bounds are attained. \par Values of G are derived for each of several suitable families of test graphs, generated by an extension of the web grammar approach. The algorithm is compared in detail with that proposed by Read for which 1 <= G <= 3.", 4563 acknowledgement = ack-nhfb, 4564 classcodes = "C1160 (Combinatorial mathematics)", 4565 corpsource = "Medical Res. Council, London, UK", 4566 keywords = "algorithm; block; block-cutpoint-tree; blocks; cut nodes; cutnode; fundamental cycle set; graph; graph theory; labelled edges; lobe; lobe decomposition; lobe decomposition graph; ordered list of edges; packed adjacency matrix; separable; spanning tree; undirected; web grammar", 4567 treatment = "T Theoretical or Mathematical", 4568} 4569 4570@Article{Ferguson:1971:BAM, 4571 author = "D. E. Ferguson", 4572 title = "Buffer Allocation in Merge-Sorting", 4573 journal = j-CACM, 4574 volume = "14", 4575 number = "7", 4576 pages = "476--478", 4577 month = jul, 4578 year = "1971", 4579 CODEN = "CACMA2", 4580 ISSN = "0001-0782", 4581 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4582 abstract = "A fixed buffer allocation for merge-sorting is presented here which minimizes the number of input-output operations for a given order of merge. \par When sorting on movable arm disks, the number of seeks is equal to the number of input-output operations, and the seek time usually controls the sort time. First some standard terminology is introduced. Then the input buffer allocation method is described, followed by an analysis of the improvement to be expected over more conventional allocation. This analysis makes use of a particular distribution function. An analysis of a completely different distribution is given which yields similar results. This suggests that the results do not depend on a particular distribution function. An optimum output buffer size is also determined. It is concluded that this buffering allocation can significantly reduce the time of merge sorting on movable arm disks when the input data are not random, and that this output buffer allocation should be used whether the data is random or not.", 4583 acknowledgement = ack-nhfb, 4584 classcodes = "C6130 (Data handling techniques)", 4585 corpsource = "Programmatics Inc., Los Angeles, CA, USA", 4586 keywords = "file; fixed buffer allocation; gamma distribution function; input output operations; item; merge sort; movable arm disks; optimum; output buffer size; seek time; sorting; storage allocation; string", 4587 treatment = "T Theoretical or Mathematical", 4588} 4589 4590@Article{Ramamoorthy:1971:SOE, 4591 author = "C. V. Ramamoorthy and M. J. Gonzalez", 4592 title = "Subexpression ordering in the execution of arithmetic expressions", 4593 journal = j-CACM, 4594 volume = "14", 4595 number = "7", 4596 pages = "479--485", 4597 month = jul, 4598 year = "1971", 4599 CODEN = "CACMA2", 4600 ISSN = "0001-0782", 4601 MRclass = "68A20", 4602 MRnumber = "46 6650", 4603 mrreviewer = "A. D. Booth", 4604 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4605 abstract = "An arithmetic expression can often be broken down into its component subexpressions. Depending on the hardware environment in which the expression is to be executed, these subexpressions can be evaluated in serials, in parallel, or in a combination of these modes. This paper shows that expression execution time can be minimized only if consideration is given to the ordering of the subexpressions. In particular, subexpressions should be executed in order of decreasing memory and processor time requirements. This observation is valid for configurations ranging from a uniprocessor with an unbuffered main memory to multiprocessor with a ``cache'' buffer memory. If the number of subexpressions which can be executed in parallel exceeds the number of available processors, then execution of some of these subexpressions must be postponed. A procedure is given which combines this requirement with the earlier ordering considerations to provide an optimal execution sequence.", 4606 acknowledgement = ack-nhfb, 4607 classcodes = "C5230 (Digital arithmetic methods); C6130 (Data handling techniques)", 4608 corpsource = "Univ. Texas, Austin, TX, USA", 4609 keywords = "arithmetic expression; arithmetic expressions; cache; compilers; computational trees; data handling; digital arithmetic; execution time; parallel processing; subexpression ordering", 4610 treatment = "T Theoretical or Mathematical", 4611} 4612 4613@Article{McVitie:1971:SMP, 4614 author = "D. G. McVitie and L. B. Wilson", 4615 title = "The Stable Marriage Problem", 4616 journal = j-CACM, 4617 volume = "14", 4618 number = "7", 4619 pages = "486--490", 4620 month = jul, 4621 year = "1971", 4622 CODEN = "CACMA2", 4623 ISSN = "0001-0782", 4624 MRclass = "90B99 (68A10)", 4625 MRnumber = "46 6808", 4626 mrreviewer = "R. B. Potts", 4627 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4628 abstract = "The original work of Gale and Shapley on an assignment method using the stable marriage criterion has been extended to find all the stable marriage assignments.\par The algorithm derived for finding all the stable marriage assignments is proved to satisfy all the conditions of the problem. Algorithm 411 applies to this paper.", 4629 acknowledgement = ack-nhfb, 4630 classcodes = "C1160 (Combinatorial mathematics); C7310 (Mathematics computing)", 4631 corpsource = "Univ. Newcastle upon Tyne, UK", 4632 keywords = "assignment; assignment problems; assignment procedures; combinatorial mathematics; combinatorics; discrete mathematics; operational research; operations research; stable marriage problem; university entrance", 4633 treatment = "T Theoretical or Mathematical", 4634} 4635 4636@Article{McVitie:1971:AAT, 4637 author = "D. G. McVitie and L. B. Wilson", 4638 title = "{ACM} Algorithm 411: Three Procedures for the Stable Marriage Problem", 4639 journal = j-CACM, 4640 volume = "14", 4641 number = "7", 4642 pages = "491--492", 4643 month = jul, 4644 year = "1971", 4645 CODEN = "CACMA2", 4646 ISSN = "0001-0782", 4647 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4648 acknowledgement = ack-nhfb, 4649 classcodes = "C7310 (Mathematics computing)", 4650 corpsource = "Univ. Newcastle upon Tyne, UK", 4651 keywords = "ALGOL procedures; assignment; combinatorial mathematics; operations research; stable marriage problem; subroutines", 4652 treatment = "T Theoretical or Mathematical", 4653} 4654 4655@Article{Cermak:1971:AAG, 4656 author = "J. {\v{C}}erm{\'{a}}k", 4657 title = "{ACM} Algorithm 412: Graph Plotter", 4658 journal = j-CACM, 4659 volume = "14", 4660 number = "7", 4661 pages = "492--493", 4662 month = jul, 4663 year = "1971", 4664 CODEN = "CACMA2", 4665 ISSN = "0001-0782", 4666 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4667 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/acm.bib", 4668 acknowledgement = ack-nhfb, 4669 classcodes = "C6150E (General utility programs)", 4670 corpsource = "Univ. Chem. Technol., Pardubice, Czechoslovakia", 4671 keywords = "ALGOL procedure; computer graphics; graph; line; multivalued function; plot; printer; subroutines; utility programs", 4672 treatment = "T Theoretical or Mathematical", 4673} 4674 4675@Article{Anonymous:1971:PSS, 4676 author = "Anonymous", 4677 title = "Papers from the 2nd symposium on symbolic and algebraic manipulation", 4678 journal = j-CACM, 4679 volume = "14", 4680 number = "8", 4681 pages = "??--??", 4682 month = aug, 4683 year = "1971", 4684 CODEN = "CACMA2", 4685 ISSN = "0001-0782", 4686 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4687 acknowledgement = ack-nhfb, 4688 classcodes = "B0210 (Algebra); C1110 (Algebra)", 4689 conflocation = "Los Angeles, CA, USA; 23-25 March 1971", 4690 conftitle = "Papers from the 2nd symposium on symbolic and algebraic manipulation", 4691 keywords = "algebra; algebraic expressions; equivalence; greatest common divisors; polynomial; polynomials; resultants; roots; subresultants; symbolic and algebraic manipulation; zero", 4692 sponsororg = "Assoc. Computing Machinery", 4693 treatment = "T Theoretical or Mathematical", 4694} 4695 4696@Article{Hearn:1971:ASM, 4697 author = "Anthony C. Hearn", 4698 title = "Applications of Symbolic Manipulation in Theoretical Physics", 4699 journal = j-CACM, 4700 volume = "14", 4701 number = "8", 4702 pages = "511--516", 4703 month = aug, 4704 year = "1971", 4705 CODEN = "CACMA2", 4706 ISSN = "0001-0782", 4707 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4708 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/reduce.bib", 4709 abstract = "This paper surveys the applications of symbolic computation techniques to problems in theoretical physics. Particular emphasis is placed on applications in quantum electrodynamics where the most activity has occurred.", 4710 acknowledgement = ack-nhfb, 4711 classcodes = "C6130 (Data handling techniques)", 4712 conflocation = "Los Angeles, CA, USA; 23-25 March 1971", 4713 conftitle = "Papers from the 2nd symposium on symbolic and algebraic manipulation", 4714 corpsource = "Univ. Utah, Salt Lake City, UT, USA", 4715 keywords = "algebraic; algebraic simplification; computational physics; data handling; physics; quantum electrodynamics; simplification; symbol manipulation; symbolic computation; symbolic manipulation; theoretical physics", 4716 sponsororg = "Assoc. Computing Machinery", 4717 treatment = "T Theoretical or Mathematical", 4718 xxtitle = "Applications of symbol manipulation in theoretical physics", 4719} 4720 4721@Article{Hall:1971:ASR, 4722 author = "A. D. {Hall, Jr.}", 4723 title = "The {Altran} system for rational function manipulation --- a survey", 4724 journal = j-CACM, 4725 volume = "14", 4726 number = "8", 4727 pages = "517--521", 4728 month = aug, 4729 year = "1971", 4730 CODEN = "CACMA2", 4731 ISSN = "0001-0782", 4732 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4733 acknowledgement = ack-nhfb, 4734 classcodes = "C6120 (File organisation); C6140D (High level languages); C7310 (Mathematics computing)", 4735 conflocation = "Los Angeles, CA, USA; 23-25 March 1971", 4736 conftitle = "Papers from the 2nd symposium on symbolic and algebraic manipulation", 4737 corpsource = "Bell Telephone Labs. Inc., Murray Hill, NJ, USA", 4738 keywords = "algebra; Altran; coefficients; computation; data structures; integer; language; languages; polynomial manipulation; polynomials; problem oriented; rational function manipulation; run time data structures; symbolic", 4739 sponsororg = "Assoc. Computing Machinery", 4740 treatment = "P Practical; T Theoretical or Mathematical", 4741} 4742 4743@Article{Fenichel:1971:LTS, 4744 author = "Robert R. Fenichel", 4745 title = "List Tracing in Systems Allowing Multiple Cell Types", 4746 journal = j-CACM, 4747 volume = "14", 4748 number = "8", 4749 pages = "522--526", 4750 month = aug, 4751 year = "1971", 4752 CODEN = "CACMA2", 4753 ISSN = "0001-0782", 4754 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4755 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 4756 acknowledgement = ack-nhfb, 4757 classcodes = "C6130 (Data handling techniques)", 4758 conflocation = "Los Angeles, CA, USA; 23-25 March 1971", 4759 conftitle = "Papers from the 2nd symposium on symbolic and algebraic manipulation", 4760 corpsource = "MIT, Cambridge, MA, USA", 4761 keywords = "configuration; list processing; list tracing; multiple cell types; size; storage allocation", 4762 sponsororg = "Assoc. Computing Machinery", 4763 treatment = "P Practical", 4764} 4765 4766@Article{Moses:1971:ASG, 4767 author = "J. Moses", 4768 title = "Algebraic Simplification: {A} Guide for the Perplexed", 4769 journal = j-CACM, 4770 volume = "14", 4771 number = "8", 4772 pages = "527--537", 4773 month = aug, 4774 year = "1971", 4775 CODEN = "CACMA2", 4776 ISSN = "0001-0782", 4777 MRclass = "68A15", 4778 MRnumber = "46 8465", 4779 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4780 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.1.bib", 4781 acknowledgement = ack-nhfb, 4782 classcodes = "B0210 (Algebra); C1110 (Algebra)", 4783 conflocation = "Los Angeles, CA, USA; 23-25 March 1971", 4784 conftitle = "Papers from the 2nd symposium on symbolic and algebraic manipulation", 4785 corpsource = "MIT, Cambridge, MA, USA", 4786 keywords = "algebra; algebraic simplification; automatic; simplification capabilities; substitution", 4787 sponsororg = "Assoc. Computing Machinery", 4788 treatment = "T Theoretical or Mathematical", 4789} 4790 4791@Article{Jefferys:1971:AAM, 4792 author = "W. H. Jefferys", 4793 title = "Automatic algebraic manipulation in celestial mechanics", 4794 journal = j-CACM, 4795 volume = "14", 4796 number = "8", 4797 pages = "538--541", 4798 month = aug, 4799 year = "1971", 4800 CODEN = "CACMA2", 4801 ISSN = "0001-0782", 4802 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4803 acknowledgement = ack-nhfb, 4804 classcodes = "C7320 (Physics and chemistry computing)", 4805 conflocation = "Los Angeles, CA, USA; 23-25 March 1971", 4806 conftitle = "Papers from the 2nd symposium on symbolic and algebraic manipulation", 4807 corpsource = "Univ. Texas, Austin, TX, USA", 4808 keywords = "algebra; automated algebraic manipulation; celestial mechanics; integration; perturbation theory; physics; Poisson series; processors", 4809 sponsororg = "Assoc. Computing Machinery", 4810 treatment = "P Practical", 4811} 4812 4813@Article{Barton:1971:GRA, 4814 author = "D. Barton and J. P. Fitch", 4815 title = "General relativity and the application of algebraic manipulative systems", 4816 journal = j-CACM, 4817 volume = "14", 4818 number = "8", 4819 pages = "542--547", 4820 month = aug, 4821 year = "1971", 4822 CODEN = "CACMA2", 4823 ISSN = "0001-0782", 4824 MRclass = "83.53", 4825 MRnumber = "48 1640", 4826 mrreviewer = "I. K. Marek", 4827 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4828 abstract = "The paper describes some applications of symbolic algebra systems to problems of general relativity including the derivation of the field equations, the Petrov classification of a metric, and the solution of the field equations in the presence of matter in a simple case. Attention is drawn to the strictly algebraic difficulties encountered in this work.", 4829 acknowledgement = ack-nhfb, 4830 classcodes = "B0210 (Algebra); C1110 (Algebra)", 4831 conflocation = "Los Angeles, CA, USA; 23-25 March 1971", 4832 conftitle = "Papers from the 2nd symposium on symbolic and algebraic manipulation", 4833 corpsource = "Computer Lab., Cambridge, UK", 4834 keywords = "algebra; algebraic manipulation; algebraic manipulative systems; equation manipulation; field equations; general relativity; nonnumerical mathematics; Petrov classification; symbolic; symbolic mathematics", 4835 sponsororg = "Assoc. Computing Machinery", 4836 treatment = "A Application; T Theoretical or Mathematical", 4837} 4838 4839@Article{Moses:1971:SIS, 4840 author = "Joel Moses", 4841 title = "Symbolic Integration: The Stormy Decade", 4842 journal = j-CACM, 4843 volume = "14", 4844 number = "8", 4845 pages = "548--560", 4846 month = aug, 4847 year = "1971", 4848 CODEN = "CACMA2", 4849 ISSN = "0001-0782", 4850 MRclass = "68A15", 4851 MRnumber = "46 8466", 4852 mrreviewer = "D. B. Hunter", 4853 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4854 abstract = "Three approaches to symbolic integration in the 1960's are described. The first, from artificial intelligence, led to Slagle's SAINT and to a large degree to Moses' SIN. The second, from algebraic manipulation, led to Manove's implementation and to Horowitz' and Tobey's reexamination of the Hermite algorithm for integrating rational functions. The third, from mathematics, led to Richardson's proof of the unsolvability of the problem for a class of functions and for Risch's decision procedure for the elementary functions.Generalizations of Risch's algorithm to a class of special functions and programs for solving differential equations and for finding the definite integral are also described.", 4855 acknowledgement = ack-nhfb, 4856 classcodes = "C1230 (Artificial intelligence); C4160 (Numerical integration and differentiation)", 4857 conflocation = "Los Angeles, CA, USA; 23-25 March 1971", 4858 conftitle = "Papers from the 2nd symposium on symbolic and algebraic manipulation", 4859 corpsource = "MIT, Cambridge, MA, USA", 4860 keywords = "algorithm; artificial intelligence; definite; definite integrals; differential equations; Hermite; integral; integrating rational functions; integration; Manove's implementation; Moses' SIN; proof; rational functions; Richardson's; Risch's decision procedure; SAINT; Slagle's; symbolic integration; unsolvability", 4861 sponsororg = "Assoc. Computing Machinery", 4862 treatment = "G General Review; T Theoretical or Mathematical", 4863} 4864 4865@Article{Teichroew:1971:ERU, 4866 author = "Daniel Teichroew", 4867 title = "Education Related to the Use of Computers in Organizations", 4868 journal = j-CACM, 4869 volume = "14", 4870 number = "9", 4871 pages = "573--588", 4872 month = sep, 4873 year = "1971", 4874 CODEN = "CACMA2", 4875 ISSN = "0001-0782", 4876 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4877 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 4878 acknowledgement = ack-nhfb, 4879 annote = "Learn about data bases and management. Extensive bibliography.", 4880 classcodes = "C0220 (Computing education and training)", 4881 keywords = "colleges; computer education; curriculum development; education; information systems; management; management information systems; professional; societies; universities", 4882 treatment = "G General Review", 4883} 4884 4885@Article{Isoda:1971:EBT, 4886 author = "Sadahiro Isoda and Eiichi Goto and Izumi Kimura", 4887 title = "An Efficient Bit Table Technique for Dynamic Storage Allocation of $2^n$-word Blocks", 4888 journal = j-CACM, 4889 volume = "14", 4890 number = "9", 4891 pages = "589--592", 4892 month = sep, 4893 year = "1971", 4894 CODEN = "CACMA2", 4895 ISSN = "0001-0782", 4896 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4897 abstract = "An efficient bit table technique for dynamic storage allocation of $2^n$-word blocks, which requires a minimized amount of memory for bookkeeping purposes, is described. The technique has been tested in an implementation of the list processing language $L^6$. A number of ideas incorporated in the processor are also described.", 4898 acknowledgement = ack-nhfb, 4899 classcodes = "C6120 (File organisation)", 4900 corpsource = "Tokyo Univ., Japan", 4901 keywords = "$L^6$; 2/sup n/ word blocks; bit table; bit table technique; bookkeeping; buddy system; dynamic storage allocation; free storage; L/sup 6/; list processing; list processing language; minimum memory; storage allocation", 4902 treatment = "P Practical", 4903} 4904 4905@Article{Paton:1971:CAB, 4906 author = "Keith Paton", 4907 title = "Corrigendum: ``{An algorithm for the blocks and cutnodes of a graph}''", 4908 journal = j-CACM, 4909 volume = "14", 4910 number = "9", 4911 pages = "592--592", 4912 month = sep, 4913 year = "1971", 4914 CODEN = "CACMA2", 4915 ISSN = "0001-0782", 4916 bibdate = "Fri Jan 17 18:33:19 1997", 4917 note = "See \cite{Paton:1971:ABC}.", 4918 acknowledgement = ack-nhfb, 4919} 4920 4921@Article{Wong:1971:CSA, 4922 author = "Eugene Wong and T. C. Chiang", 4923 title = "Canonical Structure in Attribute Based File Organization", 4924 journal = j-CACM, 4925 volume = "14", 4926 number = "9", 4927 pages = "593--597", 4928 month = sep, 4929 year = "1971", 4930 CODEN = "CACMA2", 4931 ISSN = "0001-0782", 4932 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4933 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 4934 note = "Also published in/as: PhD Th., UCB, EECS, 1973.", 4935 acknowledgement = ack-nhfb, 4936 annote = "Combinatorial retrieval of multi-attribute subsets, applicable when there are few keyword choices. Thisis of T. C. Chiang.", 4937 classcodes = "C6120 (File organisation)", 4938 corpsource = "Univ. California, Berkeley, CA, USA", 4939 keywords = "arbitrary Boolean functions; atoms; attribute based; boolean algebra; canonical structure; file organisation; file organization; intersections; lists; queries", 4940 treatment = "T Theoretical or Mathematical", 4941} 4942 4943@Article{Phillips:1971:NBO, 4944 author = "David L. Phillips", 4945 title = "A note on best one-sided approximations", 4946 journal = j-CACM, 4947 volume = "14", 4948 number = "9", 4949 pages = "598--600", 4950 month = sep, 4951 year = "1971", 4952 CODEN = "CACMA2", 4953 ISSN = "0001-0782", 4954 MRclass = "65D15", 4955 MRnumber = "45 6158", 4956 mrreviewer = "H. L. Loeb", 4957 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4958 acknowledgement = ack-nhfb, 4959 classcodes = "C4130 (Interpolation and function approximation)", 4960 corpsource = "Argonne Nat. Lab., IL, USA", 4961 keywords = "best; best approximation; best approximations; error; function approximation; goodness of fit; logarithmic; multiplicative constant; one sided approximations; one-sided approximation; relationship; relative error; uniform norm", 4962 treatment = "T Theoretical or Mathematical", 4963} 4964 4965@Article{Liniger:1971:SCN, 4966 author = "W. Liniger", 4967 title = "A stopping criterion for the {Newton-Raphson} method in implicit multistep integration algorithms for nonlinear systems of ordinary differential equations", 4968 journal = j-CACM, 4969 volume = "14", 4970 number = "9", 4971 pages = "600--601", 4972 month = sep, 4973 year = "1971", 4974 CODEN = "CACMA2", 4975 ISSN = "0001-0782", 4976 MRclass = "65.60", 4977 MRnumber = "44\#7754", 4978 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4979 acknowledgement = ack-nhfb, 4980 classcodes = "C4170 (Differential equations)", 4981 corpsource = "IBM, Yorktown Heights, NY, USA", 4982 keywords = "implicit multistep integration; integration; linear multistep formulas; Newton-Raphson method; nonlinear differential equations; nonlinear systems; ordinary differential equations; stopping criterion", 4983 treatment = "T Theoretical or Mathematical", 4984} 4985 4986@Article{Flores:1971:ABS, 4987 author = "Ivan Flores and George Madpis", 4988 title = "Average Binary Search Length for Dense Ordered Lists", 4989 journal = j-CACM, 4990 volume = "14", 4991 number = "9", 4992 pages = "602--603", 4993 month = sep, 4994 year = "1971", 4995 CODEN = "CACMA2", 4996 ISSN = "0001-0782", 4997 bibdate = "Tue Mar 25 13:26:09 MST 1997", 4998 note = "See corrigendum \cite{Flores:1972:CAB}.", 4999 acknowledgement = ack-nhfb, 5000 classcodes = "C6130 (Data handling techniques)", 5001 corpsource = "City Univ. New York, NY, USA", 5002 keywords = "average length; binary search; dense ordered lists; information retrieval; list processing", 5003 treatment = "T Theoretical or Mathematical", 5004} 5005 5006@Article{Fenichel:1971:CCL, 5007 author = "R. R. Fenichel", 5008 title = "Comment on Cheney's List-Compaction Algorithm", 5009 journal = j-CACM, 5010 volume = "14", 5011 number = "9", 5012 pages = "603--604", 5013 month = sep, 5014 year = "1971", 5015 CODEN = "CACMA2", 5016 ISSN = "0001-0782", 5017 bibdate = "Fri Jan 17 18:31:54 1997", 5018 keywords = "garbage collector; LISP; list processing; storage allocation; virtual memory", 5019} 5020 5021@Article{Earley:1971:TUD, 5022 author = "Jay Earley", 5023 title = "Toward an Understanding of Data Structures", 5024 journal = j-CACM, 5025 volume = "14", 5026 number = "10", 5027 pages = "617--627", 5028 month = oct, 5029 year = "1971", 5030 CODEN = "CACMA2", 5031 ISSN = "0001-0782", 5032 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5033 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 5034 acknowledgement = ack-nhfb, 5035 classcodes = "C6120 (File organisation)", 5036 corpsource = "Univ. California, Berkeley, CA, USA", 5037 keywords = "data structures; formalism; graph; implementation; programming language; semantic", 5038 treatment = "P Practical", 5039} 5040 5041@Article{ANSI:1971:CFS, 5042 author = "{ANSI Subcommittee X3J3}", 5043 title = "Clarification of {Fortran} Standards --- Second Report", 5044 journal = j-CACM, 5045 volume = "14", 5046 number = "10", 5047 pages = "628--642", 5048 month = oct, 5049 year = "1971", 5050 CODEN = "CACMA2", 5051 ISSN = "0001-0782", 5052 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5053 note = "See also \cite{ANSI:1966:AF}.", 5054 acknowledgement = ack-nhfb, 5055 classcodes = "C0200 (General computer topics); C6140D (High level languages)", 5056 keywords = "American National Standard; Basic Fortran; Fortran; FORTRAN; language; language standard; language standard interpretation; language standard maintenance; programming language; specification; standard clarification; standardization; standardization committee; standards", 5057 treatment = "G General Review", 5058} 5059 5060@Article{Oldehoeft:1971:EAI, 5061 author = "A. E. Oldehoeft and S. D. Conte", 5062 title = "Experiments with an automated instructional system for numerical methods", 5063 journal = j-CACM, 5064 volume = "14", 5065 number = "10", 5066 pages = "643--650", 5067 month = oct, 5068 year = "1971", 5069 CODEN = "CACMA2", 5070 ISSN = "0001-0782", 5071 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5072 acknowledgement = ack-nhfb, 5073 classcodes = "C7810C (Computer-aided instruction)", 5074 corpsource = "Iowa State Univ., Ames, IA, USA", 5075 keywords = "computer aided; computer aided instruction; instruction; instructional systems; numerical methods", 5076 treatment = "X Experimental", 5077} 5078 5079@Article{Newman:1971:DP, 5080 author = "W. M. Newman", 5081 title = "Display procedures", 5082 journal = j-CACM, 5083 volume = "14", 5084 number = "10", 5085 pages = "651--660", 5086 month = oct, 5087 year = "1971", 5088 CODEN = "CACMA2", 5089 ISSN = "0001-0782", 5090 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5091 acknowledgement = ack-nhfb, 5092 classcodes = "C5540 (Terminals and graphic displays)", 5093 corpsource = "Univ. Utah, Salt Lake City, UT, USA", 5094 keywords = "computer graphics; display files; display systems; programming languages", 5095 treatment = "G General Review", 5096} 5097 5098@Article{Nemeth:1971:UPM, 5099 author = "A. G. Nemeth and P. D. Rovner", 5100 title = "User program measurement in a time-shared environment", 5101 journal = j-CACM, 5102 volume = "14", 5103 number = "10", 5104 pages = "661--666", 5105 month = oct, 5106 year = "1971", 5107 CODEN = "CACMA2", 5108 ISSN = "0001-0782", 5109 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5110 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/monitor.bib and ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1971.bib", 5111 abstract = "A general discussion of the measurement of software systems is followed by a description of a hardware and software scheme for measuring user programs in a time-shared environment. The TX-2 computer at MIT Lincoln Laboratory was used for the implementation of such a system and the characteristics of this implementation are reported. Finally, it is shown how other time-sharing systems may provide similar measuring facilities.", 5112 acknowledgement = ack-nhfb, 5113 annote = "A general discussion of the measurement of software systems is followed by a description of a hardware and software scheme for measuring user programs in a time-shared environment.", 5114 classcodes = "C6150J (Operating systems)", 5115 corpsource = "MIT, Lexington, MA, USA", 5116 country = "USA", 5117 descriptors = "Performance evaluation; software monitor; time sharing; operating system; multiprogramming; measurement; technology; virtual computer; performance improvement;", 5118 enum = "2252", 5119 keywords = "computer software; measurement; multiprogramming systems; operating systems; performance improvement; sharing systems; software; technology; time; time-sharing systems; TX2 computer; user program measurement; virtual computers", 5120 language = "English", 5121 references = "11", 5122 treatment = "G General Review", 5123} 5124 5125@Article{Courtois:1971:CC, 5126 author = "P. J. Courtois and F. Heymans and D. L. Parnas", 5127 title = "Concurrent Control with `Readers' and `Writers'", 5128 journal = j-CACM, 5129 volume = "14", 5130 number = "10", 5131 pages = "667--668", 5132 month = oct, 5133 year = "1971", 5134 CODEN = "CACMA2", 5135 ISSN = "0001-0782", 5136 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5137 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Misc/softeng.bib", 5138 acknowledgement = ack-nhfb, 5139 annote = "Algorithms for scheduler design for multi accessed database", 5140 classcodes = "C6150J (Operating systems)", 5141 corpsource = "MBLE Res. Lab., Brussels, Belgium", 5142 keywords = "critical section; mutual exclusion; operating systems (computers); programs; resources; shared access to; supervisory and executive", 5143 treatment = "P Practical", 5144} 5145 5146@Article{Lyness:1971:AAE, 5147 author = "J. N. Lyness and G. Sande", 5148 title = "{ACM} Algorithm 413: {ENTCAF} and {ENTCRE}: Evaluation of Normalized {Taylor} Coefficients of an Analytic Function ({C5})", 5149 journal = j-CACM, 5150 volume = "14", 5151 number = "10", 5152 pages = "669--675", 5153 month = oct, 5154 year = "1971", 5155 CODEN = "CACMA2", 5156 ISSN = "0001-0782", 5157 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5158 acknowledgement = ack-nhfb, 5159 classcodes = "C7310 (Mathematics computing)", 5160 corpsource = "Argonne Nat. Lab., IL, USA", 5161 keywords = "Cauchy integral; complex arithmetic; complex variables; fast; Fourier transform; interpolation; mathematics; numerical differentiation; numerical integration; subroutines; Taylor coefficients; Taylor series", 5162 treatment = "T Theoretical or Mathematical", 5163} 5164 5165@Article{Branquart:1971:CSA, 5166 author = "P. Branquart and J. Lewi and M. Sintzoff and P. L. Wodon", 5167 title = "The composition of semantics in {Algol 68}", 5168 journal = j-CACM, 5169 volume = "14", 5170 number = "11", 5171 pages = "697--708", 5172 month = nov, 5173 year = "1971", 5174 CODEN = "CACMA2", 5175 ISSN = "0001-0782", 5176 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5177 acknowledgement = ack-nhfb, 5178 classcodes = "C6140D (High level languages)", 5179 corpsource = "MBLE, Brussels, Belgium", 5180 keywords = "ALGOL; Algol 68; data; design of programming languages; programming languages; programming primitives; recursive composition; semantics; structures", 5181 treatment = "T Theoretical or Mathematical", 5182} 5183 5184@Article{Hamblen:1971:UCH, 5185 author = "J. W. Hamblen", 5186 title = "Using computers in higher education: past recommendations, status, and needs", 5187 journal = j-CACM, 5188 volume = "14", 5189 number = "11", 5190 pages = "709--712", 5191 month = nov, 5192 year = "1971", 5193 CODEN = "CACMA2", 5194 ISSN = "0001-0782", 5195 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5196 acknowledgement = ack-nhfb, 5197 classcodes = "C0220 (Computing education and training)", 5198 corpsource = "Southern Regional Education Board, Atlanta, GA, USA", 5199 keywords = "computer science; computers; data processing; degree programs; education; educational technology; higher education; laboratory; national goals; testing", 5200 treatment = "G General Review", 5201} 5202 5203@Article{Shell:1971:OPS, 5204 author = "D. L. Shell", 5205 title = "Optimizing the Polyphase Sort", 5206 journal = j-CACM, 5207 volume = "14", 5208 number = "11", 5209 pages = "713--719", 5210 month = nov, 5211 year = "1971", 5212 CODEN = "CACMA2", 5213 ISSN = "0001-0782", 5214 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5215 note = "See corrigendum \cite{Shell:1972:COP}.", 5216 abstract = "Various dispersion algorithms for the polyphase sorting procedure are examined.The optimum algorithm based on minimizing the total number of unit strings read is displayed. The logic of this algorithm is rather complicated; hence, several other new dispersion algorithms with more straightforward logic are presented. Of the simple dispersion algorithms discussed, the Horizontal is best. It does approximately one-fourth to one and one-half percent less reading and writing than most algorithms in use today. An additional two and one-fourth to three percent improvement can be achieved by utilizing the Modified Optimum Algorithm. This algorithm is relatively straightforward, but it requires a fairly close estimate of the total number of unit strings before the dispersion begins.", 5217 acknowledgement = ack-nhfb, 5218 classcodes = "C6130 (Data handling techniques)", 5219 corpsource = "General Electric Co., Schenectady, NY, USA", 5220 keywords = "dispersion algorithm; dispersion algorithms; minimizing; optimisation; optimum; optimum dispersion algorithm; polyphase sorting; repetition operator; sorting; unit strings", 5221 treatment = "T Theoretical or Mathematical", 5222} 5223 5224@Article{Aramaki:1971:AEL, 5225 author = "I. Aramaki and T. Kawabata and K. Arimoto", 5226 title = "Automation of etching-pattern layout", 5227 journal = j-CACM, 5228 volume = "14", 5229 number = "11", 5230 pages = "720--730", 5231 month = nov, 5232 year = "1971", 5233 CODEN = "CACMA2", 5234 ISSN = "0001-0782", 5235 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5236 acknowledgement = ack-nhfb, 5237 classcodes = "B1130B (Computer-aided circuit analysis and design); B2210 (Printed circuits); C7410D (Electronic engineering computing)", 5238 corpsource = "Sumitomo Electric Industries Ltd., Osaka, Japan", 5239 keywords = "computer-aided circuit design; etching; heuristic etching pattern layout; ICs; Lee's algorithm; maze running; printed circuit board; printed circuits; wiring design", 5240 treatment = "P Practical", 5241} 5242 5243@Article{Malcolm:1971:AFP, 5244 author = "Michael A. Malcolm", 5245 title = "On Accurate Floating-Point Summation", 5246 journal = j-CACM, 5247 volume = "14", 5248 number = "11", 5249 pages = "731--736", 5250 month = nov, 5251 year = "1971", 5252 CODEN = "CACMA2", 5253 ISSN = "0001-0782", 5254 MRclass = "65G05 (68-XX)", 5255 MRnumber = "47 4434", 5256 mrreviewer = "P. Brock", 5257 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5258 bibsource = "garbo.uwasa.fi:/pc/doc-soft/fpbiblio.txt", 5259 acknowledgement = ack-nj, 5260 acknowledgement = ack-nhfb, 5261 classcodes = "C5230 (Digital arithmetic methods)", 5262 corpsource = "Stanford Univ., CA, USA", 5263 keywords = "digital arithmetic; error analysis; floating point summation", 5264 treatment = "P Practical", 5265} 5266 5267@Article{Golub:1971:AAC, 5268 author = "G. H. Golub and L. B. Smith", 5269 title = "{ACM} Algorithm 414: {Chebyshev} Approximation of Continuous Functions by a {Chebyshev} System of Functions", 5270 journal = j-CACM, 5271 volume = "14", 5272 number = "11", 5273 pages = "737--746", 5274 month = nov, 5275 year = "1971", 5276 CODEN = "CACMA2", 5277 ISSN = "0001-0782", 5278 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5279 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/acm.bib", 5280 acknowledgement = ack-nhfb, 5281 classcodes = "C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 5282 corpsource = "Stanford Univ., CA, USA", 5283 keywords = "ALGOL 60; approximation; Chebyshev approximation; critical points; minimax; numerical properties; orthogonal polynomials; Remez algorithm; subroutines", 5284 treatment = "P Practical; T Theoretical or Mathematical", 5285} 5286 5287@Article{Gordon:1971:RPT, 5288 author = "R. Gordon and G. T. Herman", 5289 title = "Reconstruction of Pictures from Their Projections", 5290 journal = j-CACM, 5291 volume = "14", 5292 number = "12", 5293 pages = "759--768", 5294 month = dec, 5295 year = "1971", 5296 CODEN = "CACMA2", 5297 ISSN = "0001-0782", 5298 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5299 note = "See corrigendum \cite{Gordon:1972:CRP}.", 5300 abstract = "There are situations in the natural sciences and medicine (e.g. in electron microscopy and X-ray photography) in which it is desirable to estimate the gray levels of a digital picture at the individual points from the sums of the gray levels along straight lines (projections) at a few angles. Usually, in such situations, the picture is far from determined and the problem is to find the ``most representative'' picture. Three algorithms are described (all using Monte Carlo methods) which were designed to solve this problem. The algorithms are applicable in a large and varied number of fields. The most important uses may be the reconstruction of possibly asymmetric particles from electron micrographs and three-dimensional X-ray analysis.", 5301 acknowledgement = ack-nhfb, 5302 classcodes = "C7300 (Natural sciences computing)", 5303 corpsource = "State Univ., New York, Buffalo, NY, USA", 5304 keywords = "approximation; biomedical image processing; efficient encoding; electron microscopy; image; image processing; linear programming; mathematical programming; medicine; Monte Carlo; Monte Carlo methods; Monte Carlo techniques; natural sciences; optical information; optimization; physics; picture compression; picture description; picture processing; processing; projections; reconstruction of pictures; stereology; techniques; X-ray analysis; X-ray photography", 5305 treatment = "P Practical", 5306} 5307 5308@Article{Amidon:1971:ASB, 5309 author = "E. L. Amidon and G. S. Akin", 5310 title = "Algorithmic Selection of the Best Method for Compressing Map Data Strings", 5311 journal = j-CACM, 5312 volume = "14", 5313 number = "12", 5314 pages = "769--774", 5315 month = dec, 5316 year = "1971", 5317 CODEN = "CACMA2", 5318 ISSN = "0001-0782", 5319 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5320 abstract = "The best of a dozen different methods for compressing map data is illustrated. The choices are generated by encoding data strings-sequence of like codes-by three methods and in four directions. Relationships are developed between compression alternatives to avoid comparing all of them. The technique has been used to compress data from forest resource maps, but is widely applicable to map and photographic data reduction.", 5321 acknowledgement = ack-nhfb, 5322 classcodes = "C6130 (Data handling techniques); C7890 (Other special applications of computing)", 5323 corpsource = "Pacific Southwest Forest and Range Experiment Station, Berkeley, CA, USA", 5324 keywords = "data compression; data reduction; data reduction and analysis; data strings; forest resource maps; information retrieval; input/output; map; map storage; run coding; storage", 5325 treatment = "P Practical", 5326} 5327 5328@Article{Mullin:1971:RUS, 5329 author = "James K. Mullin", 5330 title = "Retrieval-Update Speed Trade-offs Using Combined Indexes", 5331 journal = j-CACM, 5332 volume = "14", 5333 number = "12", 5334 pages = "775--776", 5335 month = dec, 5336 year = "1971", 5337 CODEN = "CACMA2", 5338 ISSN = "0001-0782", 5339 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5340 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 5341 acknowledgement = ack-nhfb, 5342 classcodes = "C7250 (Information storage and retrieval)", 5343 corpsource = "Univ. Western Ontario, London, Ont., Canada", 5344 keywords = "combined index files; file; file organisation; file update; indexing; information retrieval; information retrieval systems; inverted files; minimal cost; organisation; query; retrieval time; speed tradeoffs", 5345 treatment = "P Practical", 5346 xxtitle = "Retrieval-update speed tradeoffs using combined indices", 5347} 5348 5349@Article{Harrison:1971:IST, 5350 author = "M. C. Harrison", 5351 title = "Implementation of the Substring Test by Hashing", 5352 journal = j-CACM, 5353 volume = "14", 5354 number = "12", 5355 pages = "777--779", 5356 month = dec, 5357 year = "1971", 5358 CODEN = "CACMA2", 5359 ISSN = "0001-0782", 5360 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5361 note = "See also \cite{Tharp:1982:PTS}.", 5362 acknowledgement = ack-nhfb, 5363 classcodes = "C6130 (Data handling techniques)", 5364 corpsource = "New York Univ., NY, USA", 5365 keywords = "compression; data handling; hashing; information; information retrieval; programming; searching; signature; subset; substring test", 5366 treatment = "P Practical", 5367} 5368 5369@Article{Wulf:1971:BLS, 5370 author = "W. A. Wulf and D. B. Russell and A. N. Habermann", 5371 title = "{BLISS}: {A} language for systems programming", 5372 journal = j-CACM, 5373 volume = "14", 5374 number = "12", 5375 pages = "780--790", 5376 month = dec, 5377 year = "1971", 5378 CODEN = "CACMA2", 5379 ISSN = "0001-0782", 5380 MRclass = "68A05", 5381 MRnumber = "46 8463", 5382 mrreviewer = "P. Deussen", 5383 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5384 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Ai/Ai.misc.bib", 5385 abstract = "A language, BLISS, is described. This language is designed so as to be especially suitable for use in writing production software systems for a specific machine (the PDP-10): compilers, operating systems, etc. Prime design goals of the design are the ability to produce highly efficient object code, to allow access to all relevant hardware features of the host machine, and to provide a rational means by which to cope with the evolutionary nature of systems programs. A major feature which contributes to the realization of these goals is a mechanism permitting the definition of the representation of all data structures in terms of the access algorithm for elements of the structure.", 5386 acknowledgement = ack-nhfb, 5387 classcodes = "C5420 (Mainframes and minicomputers); C6120 (File organisation); C6150C (Compilers, interpreters and other processors); C6150J (Operating systems)", 5388 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 5389 keywords = "data structures; implementation language; programming languages; systems programming", 5390 keywords = "BLISS; compilers; data structures; language; minicomputers; operating systems; program processors; programming languages; software systems; supervisory and executive programs; systems programming", 5391 treatment = "P Practical", 5392} 5393 5394@Article{Rochfeld:1971:NLT, 5395 author = "A. Rochfeld", 5396 title = "New {LISP} Techniques for a Paging Environment", 5397 journal = j-CACM, 5398 volume = "14", 5399 number = "12", 5400 pages = "791--795", 5401 month = dec, 5402 year = "1971", 5403 CODEN = "CACMA2", 5404 ISSN = "0001-0782", 5405 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5406 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 5407 acknowledgement = ack-nhfb, 5408 classcodes = "C6120 (File organisation); C6140D (High level languages)", 5409 corpsource = "Univ. Edinburgh, UK", 5410 keywords = "block segment; collection; compact; core fragmentation; garbage; LISP; list processing; list structures; management; paging environment; procedure oriented languages; storage; virtual memory", 5411 treatment = "P Practical", 5412} 5413 5414@Article{Blumberg:1971:NMN, 5415 author = "J. W. Blumberg and C. R. Foulk", 5416 title = "A note on `a modification of {Nordsieck}'s method using an ``off-step'' point'", 5417 journal = j-CACM, 5418 volume = "14", 5419 number = "12", 5420 pages = "796--796", 5421 month = dec, 5422 year = "1971", 5423 CODEN = "CACMA2", 5424 ISSN = "0001-0782", 5425 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5426 acknowledgement = ack-nhfb, 5427 classcodes = "C4170 (Differential equations)", 5428 corpsource = "Ohio State Univ., Columbus, OH, USA", 5429 keywords = "corrector; corrector methods; differential equations; modification; multistep methods; Nordsieck's method; numerical methods; off error; ordinary differential equations; predictor; predictor-; round", 5430 treatment = "T Theoretical or Mathematical", 5431} 5432 5433@Article{Gustafson:1971:RCG, 5434 author = "Sven-{\AA}ke A. Gustafson", 5435 title = "Rapid Computation of General Interpolation Formulas and Mechanical Quadrature Rules", 5436 journal = j-CACM, 5437 volume = "14", 5438 number = "12", 5439 pages = "797--801", 5440 month = dec, 5441 year = "1971", 5442 CODEN = "CACMA2", 5443 ISSN = "0001-0782", 5444 MRclass = "65D05", 5445 MRnumber = "46 10167a", 5446 mrreviewer = "V. Pereyra", 5447 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5448 acknowledgement = ack-nhfb, 5449 classcodes = "C4130 (Interpolation and function approximation)", 5450 corpsource = "Royal Inst. Technol., Stockholm, Sweden", 5451 keywords = "divided differences; formula; functionals; general interpolation formulas; Hermitian; interpolation; Lagrangian; linear; mechanical quadrature rules; Newton's interpolation; rapid computation", 5452 treatment = "T Theoretical or Mathematical", 5453} 5454 5455@Article{Bourgeois:1971:EMA, 5456 author = "Fran{\c{c}}ois Bourgeois and Jean-Claude Lassalle", 5457 title = "An extension of the {Munkres} algorithm for the assignment problem to rectangular matrices", 5458 journal = j-CACM, 5459 volume = "14", 5460 number = "12", 5461 pages = "802--804", 5462 month = dec, 5463 year = "1971", 5464 CODEN = "CACMA2", 5465 ISSN = "0001-0782", 5466 MRclass = "90C05", 5467 MRnumber = "47 4628", 5468 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5469 abstract = "The assignment problem, together with Munkres proposed algorithm for its solution in square matrices, is presented first. Then the authors develop an extension of this algorithm which permits a solution for rectangular matrices. Timing results obtained by using an adapted version of Silver's Algol procedure are discussed, and a relation between solution time and problem size is given.", 5470 acknowledgement = ack-nhfb, 5471 classcodes = "C4140 (Linear algebra)", 5472 corpsource = "CERN, Geneva, Switzerland", 5473 keywords = "algorithm; assignment problem; matrix algebra; Munkres algorithm; operations research; optimisation; optimization theory; rectangular matrices", 5474 treatment = "T Theoretical or Mathematical", 5475} 5476 5477@Article{Bourgeois:1971:AAA, 5478 author = "F. Bourgeois and J. C. Lassalle", 5479 title = "{ACM} Algorithm 415: Algorithm for the Assignment Problem (Rectangular Matrices)", 5480 journal = j-CACM, 5481 volume = "14", 5482 number = "12", 5483 pages = "805--806", 5484 month = dec, 5485 year = "1971", 5486 CODEN = "CACMA2", 5487 ISSN = "0001-0782", 5488 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5489 acknowledgement = ack-nhfb, 5490 classcodes = "C4140 (Linear algebra)", 5491 corpsource = "CERN, Geneva, Switzerland", 5492 keywords = "algorithm; assignment problem; matrix algebra; operations research; optimization; rectangular matrices; subroutines", 5493 treatment = "T Theoretical or Mathematical", 5494} 5495 5496@Article{Gustafson:1971:AARa, 5497 author = "Sven-{\AA}ke Gustafson", 5498 title = "{ACM} Algorithm 416: Rapid Computation of Coefficients of Interpolation Formulas [{E1}]", 5499 journal = j-CACM, 5500 volume = "14", 5501 number = "12", 5502 pages = "806--807", 5503 month = dec, 5504 year = "1971", 5505 CODEN = "CACMA2", 5506 ISSN = "0001-0782", 5507 MRclass = "65D05", 5508 MRnumber = "46 10167b", 5509 mrreviewer = "V. Pereyra", 5510 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5511 acknowledgement = ack-nhfb, 5512 classcodes = "C4130 (Interpolation and function approximation)", 5513 corpsource = "Stanford Univ., CA, USA", 5514 keywords = "algorithm; coefficients; divided differences; interpolation; interpolation formula; rapid computation; subroutines", 5515 treatment = "T Theoretical or Mathematical", 5516} 5517 5518@Article{Gustafson:1971:AARb, 5519 author = "Sven-{\AA}ke Gustafson", 5520 title = "{ACM} Algorithm 417: Rapid Computation of Weights of Interpolatory Quadrature Rules [{D1}]", 5521 journal = j-CACM, 5522 volume = "14", 5523 number = "12", 5524 pages = "807--807", 5525 month = dec, 5526 year = "1971", 5527 CODEN = "CACMA2", 5528 ISSN = "0001-0782", 5529 MRclass = "65D05", 5530 MRnumber = "46 10167c", 5531 mrreviewer = "V. Pereyra", 5532 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5533 acknowledgement = ack-nhfb, 5534 classcodes = "C4130 (Interpolation and function approximation)", 5535 corpsource = "Stanford Univ., CA, USA", 5536 keywords = "algorithm; divided differences; interpolation; interpolation formulae; mechanical quadrature rules; rapid computation; subroutines; weights", 5537} 5538 5539@Article{Aho:1971:POP, 5540 author = "A. V. Aho and P. J. Denning and J. D. Ullman", 5541 title = "Principles of optimal page replacement", 5542 journal = j-CACM, 5543 volume = "18", 5544 number = "1", 5545 pages = "80--93", 5546 month = jan, 5547 year = "1971", 5548 CODEN = "CACMA2", 5549 ISSN = "0001-0782", 5550 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/cache.bib", 5551} 5552 5553@Article{Johnson:1972:RCA, 5554 author = "S. C. Johnson and B. W. Kernighan", 5555 title = "Remark on {``CACM Algorithm 397''}", 5556 journal = j-CACM, 5557 volume = "5", 5558 number = "6", 5559 pages = "469", 5560 month = jun, 5561 year = "1972", 5562 CODEN = "CACMA2", 5563 ISSN = "0001-0782", 5564 bibdate = "Tue Dec 26 16:35:37 1995", 5565 note = "Check volume/number/year??", 5566 keywords = "acm cacm", 5567} 5568 5569@Article{Bartels:1972:ASM, 5570 author = "R. H. Bartels and G. W. Stewart", 5571 title = "Algorithm 432: The Solution of the Matrix Equation {$AX -+BX = C$}", 5572 journal = j-CACM, 5573 volume = "8", 5574 number = "9", 5575 pages = "820--826", 5576 month = sep, 5577 year = "1972", 5578 CODEN = "CACMA2", 5579 ISSN = "0001-0782", 5580 bibdate = "Tue May 28 11:19:15 1996", 5581 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 5582 note = "Check volume/number/year??", 5583 acknowledgement = ack-nhfb, 5584 keywords = "linear algebra; linear equations; matrices", 5585 kwds = "nla, Schur form, Sylvester equation, Lyapunov equation, matrix equation", 5586} 5587 5588@Article{Lesk:1972:PPR, 5589 author = "A. M. Lesk", 5590 title = "Pictorial pattern recognition and the phase problem of {X}-ray crystallography", 5591 journal = j-CACM, 5592 volume = "15", 5593 number = "1", 5594 pages = "3--6", 5595 month = jan, 5596 year = "1972", 5597 CODEN = "CACMA2", 5598 ISSN = "0001-0782", 5599 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5600 acknowledgement = ack-nhfb, 5601 classcodes = "A6100 (Structure of liquids and solids; crystallography); A6150 (Crystalline state); B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 5602 corpsource = "Princeton Univ., NJ, USA", 5603 keywords = "calculation methods; cross correlation; crystallography; hypotheses; molecular model building; pattern recognition; phase problem; physics; pictorial pattern recognition; structural; X-ray; X-ray crystallography", 5604 treatment = "T Theoretical or Mathematical", 5605} 5606 5607@Article{Levialdi:1972:SBP, 5608 author = "S. Levialdi", 5609 title = "On Shrinking Binary Picture Patterns", 5610 journal = j-CACM, 5611 volume = "15", 5612 number = "1", 5613 pages = "7--10", 5614 month = jan, 5615 year = "1972", 5616 CODEN = "CACMA2", 5617 ISSN = "0001-0782", 5618 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5619 abstract = "A parallel processing algorithm for shrinking binary patterns to obtain single isolated elements, one for each pattern, is presented. This procedure may be used for counting patterns on a matrix, and a hardware implementation of the algorithm using large scale integrated technology is envisioned. The principal features of this method are the very small window employed (two-by-two elements), the parallel nature of the process, and the possibility of shrinking any pattern, regardless of the complexity of its configuration. Problems regarding merging and disconnection of patterns during the process as well as the determination of the maximum number of steps necessary to obtain a single isolated element from a pattern, are reviewed and discussed. An analogy with a neural network description, in terms of McCulloch-Pitts ``neurons'' is presented.", 5620 acknowledgement = ack-nhfb, 5621 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 5622 corpsource = "CNR, Napoli, Italy", 5623 keywords = "counting binary patterns; counting patterns; disconnection; isolated element; large scale integrated; matrix; merging; multiple connected; multiple connected pictures; neural network; parallel processing; pattern recognition; pictures; shrinking; shrinking binary picture patterns; single; small window; technology", 5624 treatment = "T Theoretical or Mathematical", 5625} 5626 5627@Article{Duda:1972:UHT, 5628 author = "R. O. Duda and P. E. Hart", 5629 title = "Use of the Hough transformation to detect lines and curves in pictures", 5630 journal = j-CACM, 5631 volume = "15", 5632 number = "1", 5633 pages = "11--15", 5634 month = jan, 5635 year = "1972", 5636 CODEN = "CACMA2", 5637 ISSN = "0001-0782", 5638 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5639 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/Reverse.eng.bib", 5640 abstract = "Hough has proposed an interesting and computationally efficient procedure for detecting lines in pictures. This paper points out that the use of angle-radius rather than slope-intercept parameters simplifies the computation further. It also shows how the method can be used for more general curve fitting, and gives alternative interpretations that explain the source of its efficiency.", 5641 acknowledgement = ack-nhfb, 5642 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 5643 corpsource = "Stanford Res. Inst., Menlo Park, CA, USA", 5644 keywords = "angle radius; colinear points; curve detection; curves; detecting lines; Hough transformation; line detection; pattern recognition; picture processing; pictures; point-line transformation", 5645 treatment = "T Theoretical or Mathematical", 5646} 5647 5648@Article{Irons:1972:CES, 5649 author = "E. T. Irons and F. M. Djorup", 5650 title = "A {CRT} editing system", 5651 journal = j-CACM, 5652 volume = "15", 5653 number = "1", 5654 pages = "16--20", 5655 month = jan, 5656 year = "1972", 5657 CODEN = "CACMA2", 5658 ISSN = "0001-0782", 5659 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5660 acknowledgement = ack-nhfb, 5661 classcodes = "C6130 (Data handling techniques)", 5662 corpsource = "Inst. Defense Analyses, Princeton, NJ, USA", 5663 keywords = "CRT editing system; entry display; manipulation program; text; text editing; time sharing", 5664 treatment = "A Application; E Economic; P Practical", 5665} 5666 5667@Article{Dwyer:1972:TSA, 5668 author = "T. A. Dwyer", 5669 title = "Teacher\slash student authored {CAI} using the {NEWBASIC} system", 5670 journal = j-CACM, 5671 volume = "15", 5672 number = "1", 5673 pages = "21--28", 5674 month = jan, 5675 year = "1972", 5676 CODEN = "CACMA2", 5677 ISSN = "0001-0782", 5678 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5679 acknowledgement = ack-nhfb, 5680 classcodes = "C7810C (Computer-aided instruction)", 5681 corpsource = "Univ. Pittsburgh, PA, USA", 5682 keywords = "CAI; capability; CATALYST; computer aided instruction; flexible CAI scan; interactive; NEWBASIC system; secondary school", 5683 treatment = "A Application; P Practical", 5684} 5685 5686@Article{Shell:1972:COP, 5687 author = "Donald L. Shell", 5688 title = "Corrigendum: {``Optimizing the Polyphase Sort''}", 5689 journal = j-CACM, 5690 volume = "15", 5691 number = "1", 5692 pages = "28--28", 5693 month = jan, 5694 year = "1972", 5695 CODEN = "CACMA2", 5696 ISSN = "0001-0782", 5697 bibdate = "Fri Jan 17 18:37:36 1997", 5698 note = "See \cite{Shell:1971:OPS}.", 5699} 5700 5701@Article{McCalla:1972:MMU, 5702 author = "G. I. McCalla and J. R. Sampson", 5703 title = "{MUSE}: {A Model to Understand Simple English}", 5704 journal = j-CACM, 5705 volume = "15", 5706 number = "1", 5707 pages = "29--40", 5708 month = jan, 5709 year = "1972", 5710 CODEN = "CACMA2", 5711 ISSN = "0001-0782", 5712 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5713 acknowledgement = ack-nhfb, 5714 classcodes = "C7820 (Humanities computing)", 5715 corpsource = "Univ. Alberta, Edmonton, Alta., Canada", 5716 keywords = "ambiguity; computer model; English sentences; generalization; information addition to memory; interpretation; intersection procedure; language translation and linguistics; MUSE; natural language processing; network; resolution; semantic memory; syntactic analysis; text", 5717 treatment = "P Practical; T Theoretical or Mathematical", 5718} 5719 5720@Article{Shrager:1972:QPN, 5721 author = "R. I. Shrager", 5722 title = "Quadratic programming for nonlinear regression", 5723 journal = j-CACM, 5724 volume = "15", 5725 number = "1", 5726 pages = "41--45", 5727 month = jan, 5728 year = "1972", 5729 CODEN = "CACMA2", 5730 ISSN = "0001-0782", 5731 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5732 acknowledgement = ack-nhfb, 5733 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)", 5734 corpsource = "Dept. Health and Education, Bethesda, MD, USA", 5735 keywords = "diagonal method; linear constraints; magnified; nonlinear regression; quadratic programming", 5736 treatment = "T Theoretical or Mathematical", 5737} 5738 5739@Article{Salzer:1972:OOW, 5740 author = "H. E. Salzer", 5741 title = "Ordering +or-f(+or-f(+or-f(\ldots{}+or-f(x)\ldots{}))) when f(x) is positive monotonic", 5742 journal = j-CACM, 5743 volume = "15", 5744 number = "1", 5745 pages = "45--46", 5746 month = jan, 5747 year = "1972", 5748 CODEN = "CACMA2", 5749 ISSN = "0001-0782", 5750 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5751 acknowledgement = ack-nhfb, 5752 classcodes = "C4190 (Other numerical methods)", 5753 keywords = "combination; numerical methods; ordering; positive monotonic; real arguments; signs", 5754} 5755 5756@Article{Einarsson:1972:AAC, 5757 author = "B. Einarsson", 5758 title = "{ACM} Algorithm 418: Calculation of {Fourier} Integrals", 5759 journal = j-CACM, 5760 volume = "15", 5761 number = "1", 5762 pages = "47--48", 5763 month = jan, 5764 year = "1972", 5765 CODEN = "CACMA2", 5766 ISSN = "0001-0782", 5767 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5768 acknowledgement = ack-nhfb, 5769 classcodes = "C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 5770 corpsource = "Res. Inst. Nat. Defense, Tumba, Sweden", 5771 keywords = "calculation; FORTRAN routine; Fourier integrals; integration; subroutines", 5772 treatment = "T Theoretical or Mathematical", 5773} 5774 5775@Article{Pager:1972:PCB, 5776 author = "David Pager", 5777 title = "A Proposal for a Computer-Based Interactive Scientific Community", 5778 journal = j-CACM, 5779 volume = "15", 5780 number = "2", 5781 pages = "71--75", 5782 month = feb, 5783 year = "1972", 5784 CODEN = "CACMA2", 5785 ISSN = "0001-0782", 5786 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5787 abstract = "Because of the problems created by the explosion of papers in the mathematical sciences and the drawbacks that this places on research, it is suggested that a tree of all mathematical results and terminology be maintained in a multiterminal computer system.\par Users of the system can store in the computer an updated file of their current knowledge, and on selecting a paper to read, they can obtain from the computer the minimum subtree of theorems required to bring them from what they already know to the background knowledge which the paper assumes. Under certain conditions, means are also provided for the contribution of useful comments by the readers of a work and for interaction between commentators and with the author. \par This paper describes how the system can be organized and the role required of readers, writers, and commentators.", 5788 acknowledgement = ack-nhfb, 5789 classcodes = "C7250 (Information storage and retrieval)", 5790 corpsource = "Univ. Hawaii, Honolulu, HI, USA", 5791 keywords = "commentators; computer utility; data structures; information retrieval; interactive system; organization of scientific community; readers; trees; writers", 5792 keywords = "commentators; computer utility; data structures; information retrieval; information retrieval systems; interactive system; organization of scientific community; readers; trees; trees (mathematics); writers", 5793 treatment = "G General Review", 5794} 5795 5796@Article{Eastman:1972:PRS, 5797 author = "C. M. Eastman", 5798 title = "Preliminary report on a system for general space planning", 5799 journal = j-CACM, 5800 volume = "15", 5801 number = "2", 5802 pages = "76--87", 5803 month = feb, 5804 year = "1972", 5805 CODEN = "CACMA2", 5806 ISSN = "0001-0782", 5807 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5808 acknowledgement = ack-nhfb, 5809 classcodes = "C6140D (High level languages); C7400 (Engineering computing)", 5810 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 5811 keywords = "ALGOL; architects; CAD; computer language; computer-aided design; engineering; extension of ALGOL; general space planning; heuristic programming; orthographic drawings; set of programs; urban designers", 5812 treatment = "G General Review; P Practical", 5813} 5814 5815@Article{Martin:1972:OBT, 5816 author = "W. A. Martin and D. N. Ness", 5817 title = "Optimizing Binary Trees Grown with a Storing Algorithm", 5818 journal = j-CACM, 5819 volume = "15", 5820 number = "2", 5821 pages = "88--93", 5822 month = feb, 5823 year = "1972", 5824 CODEN = "CACMA2", 5825 ISSN = "0001-0782", 5826 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5827 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 5828 acknowledgement = ack-nhfb, 5829 classcodes = "C6130 (Data handling techniques)", 5830 corpsource = "MIT, Cambridge, MA, USA", 5831 keywords = "algorithm; binary trees; data handling; optimisation; optimization; recursion; retrieving information; sorting; trees (mathematics)", 5832 treatment = "A Application; T Theoretical or Mathematical", 5833} 5834 5835@Article{Oldehoeft:1972:MCP, 5836 author = "A. E. Oldehoeft and M. H. Halstead", 5837 title = "Maximum computing power and cost factors in the centralization problem", 5838 journal = j-CACM, 5839 volume = "15", 5840 number = "2", 5841 pages = "94--96", 5842 month = feb, 5843 year = "1972", 5844 CODEN = "CACMA2", 5845 ISSN = "0001-0782", 5846 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5847 acknowledgement = ack-nhfb, 5848 classcodes = "C0310 (EDP management)", 5849 corpsource = "Iowa State Univ., Ames, IA, USA", 5850 keywords = "centralisation; computer management; cost factors; decentralisation; economics; economies of scale; installations; large single machine installations; management; maximum computing power; multimachine", 5851 treatment = "E Economic", 5852} 5853 5854@Article{Jenkins:1972:AAZ, 5855 author = "M. A. Jenkins and J. F. Traub", 5856 title = "{ACM} Algorithm 419: Zeros of a Complex Polynomial", 5857 journal = j-CACM, 5858 volume = "15", 5859 number = "2", 5860 pages = "97--99", 5861 month = feb, 5862 year = "1972", 5863 CODEN = "CACMA2", 5864 ISSN = "0001-0782", 5865 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5866 acknowledgement = ack-nhfb, 5867 classcodes = "C4150 (Nonlinear and functional equations); C7310 (Mathematics computing)", 5868 corpsource = "Queen's Univ., Kingston, Ont., Canada", 5869 keywords = "complex polynomial; FORTRAN; poles and zeros; polynomials; roots; subroutine; subroutines; zeros", 5870 treatment = "P Practical", 5871} 5872 5873@Article{Williamson:1972:AAH, 5874 author = "H. Williamson", 5875 title = "{ACM} Algorithm 420: Hidden-Line Plotting Program", 5876 journal = j-CACM, 5877 volume = "15", 5878 number = "2", 5879 pages = "100--103", 5880 month = feb, 5881 year = "1972", 5882 CODEN = "CACMA2", 5883 ISSN = "0001-0782", 5884 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5885 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib", 5886 acknowledgement = ack-nhfb, 5887 classcodes = "C6130 (Data handling techniques)", 5888 corpsource = "Tracor Computing Corp., Austin, TX, USA", 5889 descriptors = "Fortran; graphics; iterative method; application; method; human factors; diagram manipulation; hidden line algorithm;", 5890 keywords = "computer graphics; data handling; FORTRAN; hidden line plotting; subroutine; subroutines; surface plot", 5891 treatment = "P Practical", 5892} 5893 5894@Article{Moorer:1972:MCC, 5895 author = "J. A. Moorer", 5896 title = "Music and computer composition", 5897 journal = j-CACM, 5898 volume = "15", 5899 number = "2", 5900 pages = "104--113", 5901 month = feb, 5902 year = "1972", 5903 CODEN = "CACMA2", 5904 ISSN = "0001-0782", 5905 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5906 acknowledgement = ack-nhfb, 5907 classcodes = "C1230 (Artificial intelligence); C7820 (Humanities computing)", 5908 corpsource = "Stanford Univ., CA, USA", 5909 keywords = "artificial intelligence; composition; computer music; harmony; heuristic; humanities; models of cognitive processes; music theory; program; programming", 5910 treatment = "G General Review", 5911} 5912 5913@Article{Flores:1972:CAB, 5914 author = "Ivan Flores and George Madpis", 5915 title = "Corrigendum: {``Average Binary Search Length for Dense Ordered Lists''}", 5916 journal = j-CACM, 5917 volume = "15", 5918 number = "2", 5919 pages = "113--113", 5920 month = feb, 5921 year = "1972", 5922 CODEN = "CACMA2", 5923 ISSN = "0001-0782", 5924 bibdate = "Fri Jan 17 18:37:46 1997", 5925 note = "See \cite{Flores:1971:ABS}.", 5926} 5927 5928@Article{Gordon:1972:CRP, 5929 author = "Richard Gordon and Gabor T. Herman", 5930 title = "Corrigendum: {``Reconstruction of Pictures from Their Projections''}", 5931 journal = j-CACM, 5932 volume = "15", 5933 number = "2", 5934 pages = "113--113", 5935 month = feb, 5936 year = "1972", 5937 CODEN = "CACMA2", 5938 ISSN = "0001-0782", 5939 bibdate = "Fri Jan 17 18:38:30 1997", 5940 note = "See \cite{Gordon:1971:RPT}.", 5941} 5942 5943@Article{Anonymous:1972:PAS, 5944 author = "Anonymous", 5945 title = "Papers from the 3rd {ACM} symposium on operating systems principles", 5946 journal = j-CACM, 5947 volume = "15", 5948 number = "3", 5949 pages = "??--??", 5950 month = mar, 5951 year = "1972", 5952 CODEN = "CACMA2", 5953 ISSN = "0001-0782", 5954 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5955 acknowledgement = ack-nhfb, 5956 classcodes = "C6150J (Operating systems)", 5957 conflocation = "Palo Alto, CA, USA; 18-20 Oct. 1971", 5958 conftitle = "Papers from the 3rd ACM symposium on operating systems principles", 5959 keywords = "access; computer; operating systems; operating systems (computers); parallel processing supervisory; partitioning; storage; time sharing systems", 5960 sponsororg = "Assoc. Computing machinery", 5961 treatment = "P Practical; T Theoretical or Mathematical", 5962} 5963 5964@Article{Bobrow:1972:TPT, 5965 author = "D. G. Bobrow and J. D. Burchfiel and D. L. Murphy and R. S. Tomlinson", 5966 title = "{TENEX}, {A} Paged Time-Sharing System for the {PDP-10}", 5967 journal = j-CACM, 5968 volume = "15", 5969 number = "3", 5970 pages = "135--143", 5971 month = mar, 5972 year = "1972", 5973 CODEN = "CACMA2", 5974 ISSN = "0001-0782", 5975 bibdate = "Tue Mar 25 13:26:09 MST 1997", 5976 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 5977 acknowledgement = ack-nhfb, 5978 annote = "Includes description of file system aspects and protection.", 5979 classcodes = "C6150J (Operating systems)", 5980 conflocation = "Palo Alto, CA, USA; 18-20 Oct. 1971", 5981 conftitle = "Papers from the 3rd ACM symposium on operating systems principles", 5982 corpsource = "Computer Sci. Div., Cambridge, UK", 5983 keywords = "minicomputers; paged time sharing system; PDP 10; TENEX; time-sharing programs", 5984 sponsororg = "Assoc. Computing machinery", 5985 treatment = "P Practical", 5986} 5987 5988@Article{Liskov:1972:DVO, 5989 author = "B. H. Liskov", 5990 title = "The Design of the {Venus} Operating System", 5991 journal = j-CACM, 5992 volume = "15", 5993 number = "3", 5994 pages = "144--149", 5995 month = mar, 5996 year = "1972", 5997 CODEN = "CACMA2", 5998 ISSN = "0001-0782", 5999 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6000 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib", 6001 acknowledgement = ack-nhfb, 6002 classcodes = "C5220 (Computer architecture); C6150J (Operating systems)", 6003 conflocation = "Palo Alto, CA, USA; 18-20 Oct. 1971", 6004 conftitle = "Papers from the 3rd ACM symposium on operating systems principles", 6005 corpsource = "MITRE Corporation. Bedford, MA, USA", 6006 keywords = "architecture; computer architecture; operating systems (computers); small computer; software; Venus operating system", 6007 sponsororg = "Assoc. Computing machinery", 6008 treatment = "P Practical", 6009} 6010 6011@Article{Gains:1972:OSB, 6012 author = "R. Stockton Gains", 6013 title = "An operating system based on the concept of a supervisory computer", 6014 journal = j-CACM, 6015 volume = "15", 6016 number = "3", 6017 pages = "150--156", 6018 month = mar, 6019 year = "1972", 6020 CODEN = "CACMA2", 6021 ISSN = "0001-0782", 6022 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6023 acknowledgement = ack-nhfb, 6024 classcodes = "C6150J (Operating systems)", 6025 conflocation = "Palo Alto, CA, USA; 18-20 Oct. 1971", 6026 conftitle = "Papers from the 3rd ACM symposium on operating systems principles", 6027 corpsource = "Inst. Defense Analyses, von Neumann Hall, Princeton, NJ, USA", 6028 keywords = "independent; operating system; operating systems (computers); processes; supervisory computer", 6029 sponsororg = "Assoc. Computing machinery", 6030 treatment = "P Practical; T Theoretical or Mathematical", 6031} 6032 6033@Article{Schroeder:1972:HAI, 6034 author = "Michael D. Schroeder and Jerome H. Saltzer", 6035 title = "A Hardware Architecture for Implementing Protection Rings", 6036 journal = j-CACM, 6037 volume = "15", 6038 number = "3", 6039 pages = "157--170", 6040 month = mar, 6041 year = "1972", 6042 CODEN = "CACMA2", 6043 ISSN = "0001-0782", 6044 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6045 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 6046 acknowledgement = ack-nhfb, 6047 classcodes = "C5220 (Computer architecture)", 6048 conflocation = "Palo Alto, CA, USA; 18-20 Oct. 1971", 6049 conftitle = "Papers from the 3rd ACM symposium on operating systems principles", 6050 corpsource = "MIT, Cambridge, MA, USA", 6051 keywords = "access control; access privileges; architecture; computer architecture; digital storage; Multics; protection rings; system", 6052 sponsororg = "Assoc. Computing machinery", 6053 treatment = "P Practical", 6054} 6055 6056@Article{Habermann:1972:SCP, 6057 author = "A. Nico Habermann", 6058 title = "Synchronization of Communicating Processes", 6059 journal = j-CACM, 6060 volume = "15", 6061 number = "3", 6062 pages = "171--176", 6063 month = mar, 6064 year = "1972", 6065 CODEN = "CACMA2", 6066 ISSN = "0001-0782", 6067 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6068 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 6069 acknowledgement = ack-nhfb, 6070 classcodes = "C6150J (Operating systems)", 6071 conflocation = "Palo Alto, CA, USA; 18-20 Oct. 1971", 6072 conftitle = "Papers from the 3rd ACM symposium on operating systems principles", 6073 corpsource = "Carnegie-Mellon Univ., Pittsburg, PA, USA", 6074 keywords = "buffer store; communication; concurrency; operating systems (computers); parallel processes; parallel processing; synchronisation; synchronization", 6075 sponsororg = "Assoc. Computing machinery", 6076} 6077 6078@Article{Teorey:1972:CAD, 6079 author = "Toby J. Teorey and Tad B. Pinkerton", 6080 title = "A Comparative Analysis of Disk Scheduling Policies", 6081 journal = j-CACM, 6082 volume = "15", 6083 number = "3", 6084 pages = "177--184", 6085 month = mar, 6086 year = "1972", 6087 CODEN = "CACMA2", 6088 ISSN = "0001-0782", 6089 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6090 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/is.bib", 6091 acknowledgement = ack-nhfb, 6092 annote = "Analysis, design of hardware. Minimizing seeks and latencies.", 6093 classcodes = "C6150J (Operating systems)", 6094 conflocation = "Palo Alto, CA, USA; 18-20 Oct. 1971", 6095 conftitle = "Papers from the 3rd ACM symposium on operating systems principles", 6096 corpsource = "Univ. Wisconsin, Madison, WI, USA", 6097 keywords = "criteria; disk scheduling policies; magnetic storage systems; multiprogramming; performance; seek time; waiting time", 6098 sponsororg = "Assoc. Computing machinery", 6099 treatment = "P Practical", 6100} 6101 6102@Article{Coffman:1972:SSP, 6103 author = "E. G. {Coffman, Jr.} and T. A. {Ryan, Jr.}", 6104 title = "A study of storage partitioning using a mathematical model of locality", 6105 journal = j-CACM, 6106 volume = "15", 6107 number = "3", 6108 pages = "185--190", 6109 month = mar, 6110 year = "1972", 6111 CODEN = "CACMA2", 6112 ISSN = "0001-0782", 6113 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6114 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/cache.bib", 6115 acknowledgement = ack-nhfb, 6116 classcodes = "C1220 (Simulation, modelling and identification); C6150J (Operating systems)", 6117 conflocation = "Palo Alto, CA, USA; 18-20 Oct. 1971", 6118 conftitle = "Papers from the 3rd ACM symposium on operating systems principles", 6119 corpsource = "Pennsylvania State Univ., University Park, PA, USA", 6120 keywords = "dynamic; fixed; mathematical model of locality; modelling; multiprogramming; storage allocation; storage partitioning", 6121 sponsororg = "Assoc. Computing machinery", 6122 treatment = "P Practical", 6123} 6124 6125@Article{Denning:1972:PWS, 6126 author = "Peter J. Denning and Stuart C. Schwartz", 6127 title = "Properties of the working-set model", 6128 journal = j-CACM, 6129 volume = "15", 6130 number = "3", 6131 pages = "191--198", 6132 month = mar, 6133 year = "1972", 6134 CODEN = "CACMA2", 6135 ISSN = "0001-0782", 6136 MRclass = "68A05", 6137 MRnumber = "47 6119", 6138 mrreviewer = "A. D. Booth", 6139 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6140 note = "See corrigendum \cite{Denning:1973:CWM}.", 6141 abstract = "A program's working set $W(t,T)$ at time $t$ is the set of distinct pages among the T most recently referenced pages. Relations between the average working-set size, the missing-page rate, and the interreference-interval distribution may be derived both from time-average definitions and from ensemble-average (statistical) definitions. An efficient algorithm for estimating these quantities is given. The relation to LRU (least recently used) paging is characterized. The independent-reference model, in which page references are statistically independent, is used to assess the effects to interpage dependencies on working-set size observations. Under general assumptions, working-set size is shown to be normally distributed.", 6142 acknowledgement = ack-nhfb, 6143 classcodes = "C4290 (Other computer theory)", 6144 conflocation = "Palo Alto, CA, USA; 18-20 Oct. 1971", 6145 conftitle = "Papers from the 3rd ACM symposium on operating systems principles", 6146 corpsource = "Princeton Univ., NJ, USA", 6147 keywords = "paging; paging algorithms; program behavior; program modeling; working-set model", 6148 keywords = "model; modelling; paging; programming theory; supervisory programs; working set", 6149 sponsororg = "Assoc. Computing machinery", 6150 treatment = "T Theoretical or Mathematical", 6151} 6152 6153@Article{Conway:1972:ISM, 6154 author = "R. W. Conway and W. L. Maxwell and H. L. Morgan", 6155 title = "On the Implementation of Security Measures in Information Systems", 6156 journal = j-CACM, 6157 volume = "15", 6158 number = "4", 6159 pages = "211--220", 6160 month = apr, 6161 year = "1972", 6162 CODEN = "CACMA2", 6163 ISSN = "0001-0782", 6164 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6165 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 6166 acknowledgement = ack-nhfb, 6167 classcodes = "C6130 (Data handling techniques)", 6168 corpsource = "Cornell Univ., Ithaca, NY, USA", 6169 keywords = "access control confidentiality; access management; data banks; information systems; management; model; modelling; operating systems; privacy; security; security of data", 6170 treatment = "A Application; T Theoretical or Mathematical", 6171} 6172 6173@Article{Walden:1972:SIC, 6174 author = "D. C. Walden", 6175 title = "A system for interprocess communication in a resource sharing computer network", 6176 journal = j-CACM, 6177 volume = "15", 6178 number = "4", 6179 pages = "221--230", 6180 month = apr, 6181 year = "1972", 6182 CODEN = "CACMA2", 6183 ISSN = "0001-0782", 6184 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6185 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib and ftp://ftp.ira.uka.de/pub/bibliography/Distributed/network.bib", 6186 note = "Reproduced in ``Advances in Computer Communications'', W. W. Chu, (Ed.), (1974), 340--349.", 6187 abstract = "A system of communication between processes in a time-sharing system is described and the communication system is extended so that it may be used between processes distributed throughout a computer network. \par The hypothetical application of the system to an existing network is discussed.", 6188 acknowledgement = ack-nhfb, 6189 annote = "A system of communication between processes in a time-sharing system is described and the communication is extended so that it may be used between processes distributed throughout a computer network. The hypothetical application of the system to an existing network is discussed.", 6190 classcodes = "C5490 (Other aspects of analogue and digital computers); C5620 (Computer networks and techniques)", 6191 corpsource = "Bolt Beranek and Newman Inc., Cambridge, MA, USA", 6192 country = "USA", 6193 descriptors = "Resource management; computer network; time sharing; interprocess communication;", 6194 enum = "3213", 6195 keywords = "computer networks; digital communication systems; hypothetical application; interprocess communication; resource sharing; time sharing; time-sharing; time-sharing systems", 6196 language = "English", 6197 references = "10", 6198 treatment = "T Theoretical or Mathematical", 6199} 6200 6201@Article{Herbst:1972:ELP, 6202 author = "N. M. Herbst and P. M. Will", 6203 title = "An experimental laboratory for pattern recognition and signal processing", 6204 journal = j-CACM, 6205 volume = "15", 6206 number = "4", 6207 pages = "231--244", 6208 month = apr, 6209 year = "1972", 6210 CODEN = "CACMA2", 6211 ISSN = "0001-0782", 6212 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6213 acknowledgement = ack-nhfb, 6214 classcodes = "C5490 (Other aspects of analogue and digital computers)", 6215 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 6216 keywords = "analogue input and output facilities; computer; design; display systems; image; interactive terminal; pattern recognition; process control digital; processing; programming support; pseudorandom displays; scanner control; scanners; signal processing; system; TV camera", 6217 treatment = "A Application; X Experimental", 6218} 6219 6220@Article{Matsushita:1972:HLE, 6221 author = "Yutaka Matsushita", 6222 title = "Hidden lines elimination for a rotating object", 6223 journal = j-CACM, 6224 volume = "15", 6225 number = "4", 6226 pages = "245--252", 6227 month = apr, 6228 year = "1972", 6229 CODEN = "CACMA2", 6230 ISSN = "0001-0782", 6231 MRclass = "68A10", 6232 MRnumber = "47 7945", 6233 mrreviewer = "Rani Siromoney", 6234 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6235 abstract = "A method is presented of determining which parts of three-dimensional objects are visible and which are invisible when the objects are rotated about some axis. This paper describes a polygon comparison scheme in which the relationships of two polygons can be classified into tree types, and also discusses how the relationship is changed for each pair of polygons under rotation about some axis. A rotation table is defined for each pair of polygons, which remains fixed as long as rotation is about one axis and provides a means of rapidly determining the visible and hidden line relationship between two polygons. \par Additional work must be done to extend this approach to simultaneous rotation about several axes.", 6236 acknowledgement = ack-nhfb, 6237 classcodes = "C6130 (Data handling techniques)", 6238 corpsource = "Univ. Illinois, Urbana-Champaign, IL, USA", 6239 keywords = "computer drawn picture; computer graphics; data handling; display programming; displays; graphics; hidden line; hidden line problem; polygon comparison scheme; problem; rotating object", 6240 treatment = "A Application; T Theoretical or Mathematical", 6241} 6242 6243@Article{Chase:1972:IGA, 6244 author = "S. M. Chase", 6245 title = "An implemented graph algorithm for winning {Shannon Switching Games}", 6246 journal = j-CACM, 6247 volume = "15", 6248 number = "4", 6249 pages = "253--256", 6250 month = apr, 6251 year = "1972", 6252 CODEN = "CACMA2", 6253 ISSN = "0001-0782", 6254 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6255 acknowledgement = ack-nhfb, 6256 classcodes = "C1230 (Artificial intelligence)", 6257 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 6258 keywords = "artificial intelligence; computer; game playing; graph algorithm; programme; Shannon Switching Games; winning strategy", 6259 treatment = "P Practical", 6260} 6261 6262@Article{Horowitz:1972:CSP, 6263 author = "E. Horowitz and H. L. Morgan and A. C. Shaw", 6264 title = "Computers and Society: {A} Proposed Course for Computer Scientists", 6265 journal = j-CACM, 6266 volume = "15", 6267 number = "4", 6268 pages = "257--261", 6269 month = apr, 6270 year = "1972", 6271 CODEN = "CACMA2", 6272 ISSN = "0001-0782", 6273 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6274 abstract = "The purpose of this paper is to describe a course concerned with both the effects of computers on society and the responsibilities of computer scientists to society. The impact of computers is divided into five components: political, economic, cultural, social, and moral; the main part of the paper defines each component and presents examples of the relevant issues. In the remaining portions the possible formats for such a course are discussed, a topic by topic outline is given, and a selected set of references is listed. It is hoped that the proposal will make it easier to initiate courses on this subject.", 6275 acknowledgement = ack-nhfb, 6276 classcodes = "C0220 (Computing education and training)", 6277 corpsource = "Cornell Univ., Ithaca, NY, USA", 6278 keywords = "computer scientists; computers and society; course; course proposal; cultural; economic; economic and sociological effects; education; moral; political; social; social implications", 6279 treatment = "P Practical", 6280} 6281 6282@Article{Kuki:1972:CGF, 6283 author = "H. Kuki", 6284 title = "Complex gamma function with error control", 6285 journal = j-CACM, 6286 volume = "15", 6287 number = "4", 6288 pages = "262--267", 6289 month = apr, 6290 year = "1972", 6291 CODEN = "CACMA2", 6292 ISSN = "0001-0782", 6293 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6294 acknowledgement = ack-nhfb, 6295 classcodes = "C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 6296 corpsource = "Univ. Chicago, IL, USA", 6297 keywords = "algorithm; complex; complex gamma function; error control; function approximation; loggamma function", 6298 treatment = "T Theoretical or Mathematical", 6299} 6300 6301@Article{Moler:1972:MCF, 6302 author = "C. B. Moler", 6303 title = "Matrix Computations with {Fortran} and Paging", 6304 journal = j-CACM, 6305 volume = "15", 6306 number = "4", 6307 pages = "268--270", 6308 month = apr, 6309 year = "1972", 6310 CODEN = "CACMA2", 6311 ISSN = "0001-0782", 6312 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6313 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 6314 acknowledgement = ack-nhfb, 6315 classcodes = "C4140 (Linear algebra); C6140D (High level languages)", 6316 corpsource = "Univ. Michigan, Ann Arbor, MI, USA", 6317 keywords = "FORTRAN; Fortran; linear equations; matrix algebra; matrix computations; memory hierarchy; nested loops; nla; paged memory; virtual memory", 6318 treatment = "P Practical", 6319} 6320 6321@Article{Kuki:1972:AAC, 6322 author = "Hirondo Kuki", 6323 title = "{ACM} Algorithm 421: Complex Gamma Function with Error Control", 6324 journal = j-CACM, 6325 volume = "15", 6326 number = "4", 6327 pages = "271--272", 6328 month = apr, 6329 year = "1972", 6330 CODEN = "CACMA2", 6331 ISSN = "0001-0782", 6332 MRclass = "65D20", 6333 MRnumber = "47 1249", 6334 mrreviewer = "L. Fox", 6335 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6336 acknowledgement = ack-nhfb, 6337 classcodes = "C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 6338 corpsource = "Univ. Chicago, IL, USA", 6339 keywords = "complex gamma function; complex loggamma; error control; FORTRAN; function; function approximation; programme; subroutines", 6340} 6341 6342@Article{Whitney:1972:AAM, 6343 author = "V. K. M. Whitney", 6344 title = "{ACM} Algorithm 422: Minimal Spanning Tree", 6345 journal = j-CACM, 6346 volume = "15", 6347 number = "4", 6348 pages = "273--274", 6349 month = apr, 6350 year = "1972", 6351 CODEN = "CACMA2", 6352 ISSN = "0001-0782", 6353 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6354 note = "See remark \cite{Kernighan:1973:RAM}.", 6355 acknowledgement = ack-nhfb, 6356 classcodes = "C7310 (Mathematics computing)", 6357 corpsource = "Univ. Michigan, Ann Arbor, MI, USA", 6358 keywords = "algorithm; FORTRAN; maximal spanning tree; minimal spanning tree; spanning tree; subroutines; trees (mathematics); undirected graph", 6359} 6360 6361@Article{Moler:1972:AAL, 6362 author = "C. B. Moler", 6363 title = "{ACM} Algorithm 423: Linear Equation Solver", 6364 journal = j-CACM, 6365 volume = "15", 6366 number = "4", 6367 pages = "274--274", 6368 month = apr, 6369 year = "1972", 6370 CODEN = "CACMA2", 6371 ISSN = "0001-0782", 6372 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6373 acknowledgement = ack-nhfb, 6374 classcodes = "C4140 (Linear algebra)", 6375 corpsource = "Univ. Michigan, Ann Arbor, MI, USA", 6376 keywords = "array processing; Fortran; linear algebra; linear equation solver; memory; paged memory; subroutines; virtual", 6377} 6378 6379@Article{Walden:1972:NCN, 6380 author = "D. C. Walden", 6381 title = "A Note on {Cheney}'s Nonrecursive List-Compacting Algorithm", 6382 journal = j-CACM, 6383 volume = "15", 6384 number = "4", 6385 pages = "275--275", 6386 month = apr, 6387 year = "1972", 6388 CODEN = "CACMA2", 6389 ISSN = "0001-0782", 6390 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6391 acknowledgement = ack-nhfb, 6392 classcodes = "C6130 (Data handling techniques)", 6393 corpsource = "A/S Norsk Data-Elektronikk, Oslo, Norway", 6394 keywords = "algorithm; garbage collection; list compacting; list processing; nonrecursive; storage management", 6395 treatment = "T Theoretical or Mathematical", 6396} 6397 6398@Article{Hu:1972:CDC, 6399 author = "T. C. Hu", 6400 key = "file searching, double-chained tree, binary search tree", 6401 title = "A Comment on the Double-Chained Tree", 6402 journal = j-CACM, 6403 volume = "15", 6404 number = "4", 6405 pages = "276--276", 6406 month = apr, 6407 year = "1972", 6408 CODEN = "CACMA2", 6409 ISSN = "0001-0782", 6410 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6411 acknowledgement = ack-nhfb, 6412 classcodes = "C6120 (File organisation)", 6413 corpsource = "Univ. Wisconsin, Madison, WI, USA", 6414 keywords = "binary search tree; double chained tree; file organisation; file searching; trees (mathematics)", 6415 treatment = "T Theoretical or Mathematical", 6416} 6417 6418@Article{Mullin:1972:IIS, 6419 author = "James K. Mullin", 6420 title = "An Improved Indexed-Sequential Access Method Using Hashed Overflow", 6421 journal = j-CACM, 6422 volume = "15", 6423 number = "5", 6424 pages = "301--307", 6425 month = may, 6426 year = "1972", 6427 CODEN = "CACMA2", 6428 ISSN = "0001-0782", 6429 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6430 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/hash.bib", 6431 acknowledgement = ack-nhfb, 6432 classcodes = "C6120 (File organisation)", 6433 corpsource = "Univ. Western Ontario, Ont., Canada", 6434 keywords = "cylinder; file management systems; file organisation; hashed overflow; improved index sequential access method; long overflow chains; movable head disc devices; overflow records; record keys; scatter; space allocation; storage; storage allocation; storage management; treating", 6435 treatment = "P Practical", 6436} 6437 6438@Article{Bensoussan:1972:MVM, 6439 author = "A. Bensoussan and C. T. Clingen and R. C. Daley", 6440 title = "The {Multics} Virtual Memory: Concepts and Design", 6441 journal = j-CACM, 6442 volume = "15", 6443 number = "5", 6444 pages = "308--318", 6445 month = may, 6446 year = "1972", 6447 CODEN = "CACMA2", 6448 ISSN = "0001-0782", 6449 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6450 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 6451 acknowledgement = ack-nhfb, 6452 classcodes = "C6150J (Operating systems)", 6453 corpsource = "Honeywell Information Systems Inc., Cambridge, MA, USA", 6454 keywords = "concepts; design; hierarchy; information sharing; memory; memory management; Multics virtual memory; online operating systems; Operating segments paging sharing management CACM; operating systems (computers); paging; segmentation", 6455 treatment = "P Practical", 6456} 6457 6458@Article{Christman:1972:MSA, 6459 author = "R. D. Christman", 6460 title = "{MUX}, a simple approach to on-line computing", 6461 journal = j-CACM, 6462 volume = "15", 6463 number = "5", 6464 pages = "319--329", 6465 month = may, 6466 year = "1972", 6467 CODEN = "CACMA2", 6468 ISSN = "0001-0782", 6469 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6470 acknowledgement = ack-nhfb, 6471 classcodes = "C6150J (Operating systems)", 6472 corpsource = "Univ. California, Los Alamos, NM, USA", 6473 keywords = "batch system; CDC 6600 computer; cost; design criteria; economics; implementation; input; modify files; multi-access systems; multiplexer; MUX; online computing; online operation; operating; overhead; systems (computers); user reactions", 6474 treatment = "E Economic; P Practical", 6475} 6476 6477@Article{Parnas:1972:TSM, 6478 author = "David L. Parnas", 6479 title = "A technique for software module specification with examples", 6480 journal = j-CACM, 6481 volume = "15", 6482 number = "5", 6483 pages = "330--336", 6484 month = may, 6485 year = "1972", 6486 CODEN = "CACMA2", 6487 ISSN = "0001-0782", 6488 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6489 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib", 6490 acknowledgement = ack-nhfb, 6491 classcodes = "C6110 (Systems analysis and programming)", 6492 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 6493 keywords = "programming; software design; software module specification; technique", 6494 treatment = "P Practical", 6495} 6496 6497@Article{Gentleman:1972:ICCa, 6498 author = "W. Morven Gentleman", 6499 title = "Implementing {Clenshaw-Curtis} quadrature. {I}. Methodology and experience", 6500 journal = j-CACM, 6501 volume = "15", 6502 number = "5", 6503 pages = "337--342", 6504 month = may, 6505 year = "1972", 6506 CODEN = "CACMA2", 6507 ISSN = "0001-0782", 6508 MRclass = "65D30", 6509 MRnumber = "48 5343", 6510 mrreviewer = "D. F. Mayers", 6511 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6512 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Comp.Alg.1.bib", 6513 abstract = "Clenshaw-Curtis quadrature is a particularly important automatic quadrature scheme for a variety of reasons, especially the high accuracy obtained from relatively few integrand values. However, it has received little use because it requires the computation of a cosine transformation and the arithmetic cost of this has been prohibitive. This paper is in two parts; a companion paper, ``II Computing the Cosine Transformation,'' shows that this objection can be overcome by computing the cosine transformation by a modification of the fast Fourier transform algorithm. \par This first part discusses the strategy and various error estimates, and summarizes experience with a particular implementation of the scheme.", 6514 acknowledgement = ack-nhfb, 6515 classcodes = "C4110 (Error analysis in numerical methods); C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 6516 corpsource = "Univ. Waterloo, Ont., Canada", 6517 keywords = "automatic quadrature; Chebyshev series; Clenshaw Curtis; Clenshaw-Curtis quadrature; error analysis; error estimates; experience; implementation; integration; numerical integration; numerical methods; strategy", 6518 treatment = "T Theoretical or Mathematical", 6519} 6520 6521@Article{Gentleman:1972:ICCb, 6522 author = "W. Morvin Gentleman", 6523 title = "Implementing {Clenshaw-Curtis} quadrature. {II}. Computing the cosine transformation", 6524 journal = j-CACM, 6525 volume = "15", 6526 number = "5", 6527 pages = "343--346", 6528 month = may, 6529 year = "1972", 6530 CODEN = "CACMA2", 6531 ISSN = "0001-0782", 6532 MRclass = "65D30", 6533 MRnumber = "48 5344", 6534 mrreviewer = "D. F. Mayers", 6535 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6536 abstract = "In a companion paper to this, ``I Methodology and Experiences,'' the automatic Clenshaw-Curtis quadrature scheme was described and how each quadrature formula used in the scheme requires a cosine transformation of the integrand values was shown. The high cost of these cosine transformations has been a serious drawback in using Clenshaw-Curtis quadrature. \par Two other problems related to the cosine transformation have also been trouble some. First, the conventional computation of the cosine transformation by recurrence relation is numerically unstable, particularly at the low frequencies which have the largest effect upon the integral. Second, in case the automatic scheme should require refinement of the sampling, storage is required to save the integrand values after the cosine transformation is computed. This second part of the paper shows how the cosine transformation can be computed by a modification of the fast Fourier transform and all three problems overcome. The modification is also applicable in other circumstances requiring cosine or sine transformations, such as polynomial interpolation through the Chebyshev points.", 6537 acknowledgement = ack-nhfb, 6538 classcodes = "C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 6539 corpsource = "Univ. Waterloo, Ont., Canada", 6540 keywords = "Chebyshev series; Clenshaw Curtis quadrature; Clenshaw-Curtis quadrature; cosine; cosine transformation; fast Fourier transformation; fast Fourier transforms; FFT; implementation; integration; numerical methods; polynomial interpolation; transformation", 6541 treatment = "T Theoretical or Mathematical", 6542} 6543 6544@Article{Greenspan:1972:FFD, 6545 author = "D. Greenspan and D. Schultz", 6546 title = "Fast finite-difference solution of biharmonic problems", 6547 journal = j-CACM, 6548 volume = "15", 6549 number = "5", 6550 pages = "347--350", 6551 month = may, 6552 year = "1972", 6553 CODEN = "CACMA2", 6554 ISSN = "0001-0782", 6555 MRclass = "65N05", 6556 MRnumber = "47 2829", 6557 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6558 abstract = "Setting the Reynolds number equal to zero, in a method for solving the Navier-Strokes equations numerically, results in a fast numerical method for biharmonic problems. The equation is treated as a system of two second order equations and a simple smoothing process is essential for convergence. An application is made to a crack-type problem.", 6559 acknowledgement = ack-nhfb, 6560 classcodes = "C4170 (Differential equations)", 6561 corpsource = "Univ. Wisconsin, Madison, WI, USA", 6562 keywords = "biharmonic equation; boundary value problem; numerical analysis; partial differential equations", 6563 keywords = "biharmonic problems; boundary value problem; boundary-value problems; convergence; convergence of numerical methods; crack type problem; difference equations; fast finite difference solution; Navier Stokes equations; partial differential equations; process; smoothing; two second order equations", 6564 treatment = "T Theoretical or Mathematical", 6565} 6566 6567@Article{Dunham:1972:MNA, 6568 author = "C. B. Dunham", 6569 title = "Minimax nonlinear approximation by approximation on subsets", 6570 journal = j-CACM, 6571 volume = "15", 6572 number = "5", 6573 pages = "351--351", 6574 month = may, 6575 year = "1972", 6576 CODEN = "CACMA2", 6577 ISSN = "0001-0782", 6578 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6579 acknowledgement = ack-nhfb, 6580 classcodes = "C4130 (Interpolation and function approximation)", 6581 corpsource = "Univ. Western Ontario, Ont., Canada", 6582 keywords = "function approximation; minimax nonlinear approximation; optimisation; subsets", 6583 treatment = "T Theoretical or Mathematical", 6584} 6585 6586@Article{Harter:1972:OWF, 6587 author = "Richard Harter", 6588 title = "The Optimality of {Winograd}'s Formula", 6589 journal = j-CACM, 6590 volume = "15", 6591 number = "5", 6592 pages = "352--352", 6593 month = may, 6594 year = "1972", 6595 CODEN = "CACMA2", 6596 ISSN = "0001-0782", 6597 MRclass = "352.65F05", 6598 MRnumber = "47 2801", 6599 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6600 acknowledgement = ack-nhfb, 6601 classcodes = "C4140 (Linear algebra)", 6602 keywords = "inner product; linear algebra; numerical analysis; optimality; vectors; Winograd's formula", 6603 treatment = "T Theoretical or Mathematical", 6604} 6605 6606@Article{Gentleman:1972:AAC, 6607 author = "W. M. Gentleman", 6608 title = "{ACM} Algorithm 424: {Clenshaw-Curtis} Quadrature", 6609 journal = j-CACM, 6610 volume = "15", 6611 number = "5", 6612 pages = "353--355", 6613 month = may, 6614 year = "1972", 6615 CODEN = "CACMA2", 6616 ISSN = "0001-0782", 6617 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6618 note = "See also \cite{Geddes:1979:RCC}.", 6619 acknowledgement = ack-nhfb, 6620 classcodes = "C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 6621 corpsource = "Univ. Waterloo, Ont., Canada", 6622 keywords = "Chebyshev series; Clenshaw Curtis quadrature; cosine transform; FFT; FORTRAN subroutine; integration; subroutines", 6623 treatment = "T Theoretical or Mathematical", 6624} 6625 6626@Article{Hurst:1972:AAG, 6627 author = "R. L. Hurst and R. E. Knop", 6628 title = "{ACM} Algorithm 425: Generation of Random Correlated Normal Variables", 6629 journal = j-CACM, 6630 volume = "15", 6631 number = "5", 6632 pages = "355--357", 6633 month = may, 6634 year = "1972", 6635 CODEN = "CACMA2", 6636 ISSN = "0001-0782", 6637 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6638 acknowledgement = ack-nhfb, 6639 classcodes = "C7310 (Mathematics computing)", 6640 corpsource = "Utah State Univ., Logan, UT, USA", 6641 keywords = "algorithms; FORTRAN subroutine; generation; multivariate normal density; random correlated normal variables; statistics; subroutines; timing", 6642 treatment = "T Theoretical or Mathematical", 6643} 6644 6645@Article{Bron:1972:AAM, 6646 author = "C. Bron", 6647 title = "{ACM} Algorithm 426: Merge Sort Algorithm", 6648 journal = j-CACM, 6649 volume = "15", 6650 number = "5", 6651 pages = "357--358", 6652 month = may, 6653 year = "1972", 6654 CODEN = "CACMA2", 6655 ISSN = "0001-0782", 6656 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6657 acknowledgement = ack-nhfb, 6658 classcodes = "C6130 (Data handling techniques)", 6659 corpsource = "Technol. Univ., Eindhoven, Netherlands", 6660 keywords = "ALGOL 60 procedure; merge sort algorithm; merging; recursion; sorting; subroutines", 6661 treatment = "T Theoretical or Mathematical", 6662} 6663 6664@Article{Linz:1972:AAF, 6665 author = "P. Linz", 6666 title = "{ACM} Algorithm 427: {Fourier Cosine} Integral", 6667 journal = j-CACM, 6668 volume = "15", 6669 number = "5", 6670 pages = "358--360", 6671 month = may, 6672 year = "1972", 6673 CODEN = "CACMA2", 6674 ISSN = "0001-0782", 6675 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6676 acknowledgement = ack-nhfb, 6677 classcodes = "C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 6678 corpsource = "Univ. California, Davis, CA, USA", 6679 keywords = "FORTRAN procedure; Fourier cosine integral; integration; subroutines", 6680 treatment = "T Theoretical or Mathematical", 6681} 6682 6683@Article{Yohe:1972:AAH, 6684 author = "J. M. Yohe", 6685 title = "{ACM} Algorithm 428: {Hu-Tucker} Minimum Redundancy Alphabetic Coding Method", 6686 journal = j-CACM, 6687 volume = "15", 6688 number = "5", 6689 pages = "360--362", 6690 month = may, 6691 year = "1972", 6692 CODEN = "CACMA2", 6693 ISSN = "0001-0782", 6694 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6695 acknowledgement = ack-nhfb, 6696 classcodes = "B6120B (Codes); C1260 (Information theory)", 6697 corpsource = "Univ. Wisconsin, Madison, WI, USA", 6698 keywords = "codes; encoding; FORTRAN subroutine; Hu Tucker minimum redundancy alphabetic binary coding; method; subroutines", 6699 treatment = "T Theoretical or Mathematical", 6700} 6701 6702@Article{Ashenhurst:1972:RAC, 6703 author = "R. L. Ashenhurst", 6704 title = "A report of the {ACM} curriculum committee on computer education for management. Curriculum recommendations for graduate professional programs in information systems", 6705 journal = j-CACM, 6706 volume = "15", 6707 number = "5", 6708 pages = "363--398", 6709 month = may, 6710 year = "1972", 6711 CODEN = "CACMA2", 6712 ISSN = "0001-0782", 6713 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6714 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 6715 acknowledgement = ack-nhfb, 6716 classcodes = "C0220 (Computing education and training)", 6717 keywords = "course descriptions; curriculum recommendations; education; implementation; information systems; systems analysis", 6718 treatment = "G General Review", 6719} 6720 6721@Article{Blatny:1972:OPT, 6722 author = "J. Blatny and S. R. Clark and T. A. Rourke", 6723 title = "On the optimization of performance of time-sharing systems by simulation", 6724 journal = j-CACM, 6725 volume = "15", 6726 number = "6", 6727 pages = "411--420", 6728 month = jun, 6729 year = "1972", 6730 CODEN = "CACMA2", 6731 ISSN = "0001-0782", 6732 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6733 acknowledgement = ack-nhfb, 6734 classcodes = "C4290 (Other computer theory); C6150J (Operating systems)", 6735 corpsource = "Univ. Manitoba, Winnipeg, Man., Canada", 6736 keywords = "computation theory; finite; infinite auxiliary store; job scheduling algorithm; noncontiguous store; number of jobs allowed to execute simultaneously; optimisation; optimization of performance; optimum round robin cycle time selection; programs; sharing systems; simulation; slice techniques; store size; time; time-sharing; variable time", 6737 treatment = "T Theoretical or Mathematical", 6738} 6739 6740@Article{Spacek:1972:PEP, 6741 author = "T. R. Spacek", 6742 title = "A proposal to establish a pseudo virtual memory via writable overlays", 6743 journal = j-CACM, 6744 volume = "15", 6745 number = "6", 6746 pages = "421--426", 6747 month = jun, 6748 year = "1972", 6749 CODEN = "CACMA2", 6750 ISSN = "0001-0782", 6751 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6752 acknowledgement = ack-nhfb, 6753 classcodes = "C6120 (File organisation)", 6754 corpsource = "CIA, Washington, DC, USA", 6755 keywords = "collector; display; establishment; executable storage size problems; folding; graphic; linkage editor; loader; overlay structure; paging; pseudovirtual memory; segmentation; storage allocation; writable overlays", 6756} 6757 6758@Article{Gilbert:1972:IBC, 6759 author = "P. Gilbert and W. J. Chandler", 6760 title = "Interference between Communicating Parallel Processes", 6761 journal = j-CACM, 6762 volume = "15", 6763 number = "6", 6764 pages = "427--437", 6765 month = jun, 6766 year = "1972", 6767 CODEN = "CACMA2", 6768 ISSN = "0001-0782", 6769 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6770 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 6771 acknowledgement = ack-nhfb, 6772 classcodes = "C4290 (Other computer theory); C6150J (Operating systems)", 6773 corpsource = "Univ. Southern California, Los Angeles, CA, USA", 6774 keywords = "computation theory; concurrent programming control; cooperating processes; formal programs; inclusion; interference between communicating parallel processes; mutual exclusion; operating systems; parallel processing; problem; sequences of states; transition rule", 6775 treatment = "T Theoretical or Mathematical", 6776} 6777 6778@Article{Gimpel:1972:BND, 6779 author = "J. F. Gimpel", 6780 title = "Blocks-a new datatype for {SNOBOL} 4", 6781 journal = j-CACM, 6782 volume = "15", 6783 number = "6", 6784 pages = "438--447", 6785 month = jun, 6786 year = "1972", 6787 CODEN = "CACMA2", 6788 ISSN = "0001-0782", 6789 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6790 acknowledgement = ack-nhfb, 6791 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", 6792 corpsource = "Bell Telephone Labs. Inc., Holmdel, NJ, USA", 6793 keywords = "blocks; character; composing printable output; datatype; dimensional aggregate of characters; manipulation; overstriking; problem oriented languages; right parallelepiped; SNOBOL 4; string processing; text editing; text processing; three", 6794 treatment = "P Practical", 6795} 6796 6797@Article{Martin:1972:BMM, 6798 author = "David F. Martin", 6799 title = "A {Boolean} matrix method for the computation of linear precedence functions", 6800 journal = j-CACM, 6801 volume = "15", 6802 number = "6", 6803 pages = "448--454", 6804 month = jun, 6805 year = "1972", 6806 CODEN = "CACMA2", 6807 ISSN = "0001-0782", 6808 MRclass = "68A30", 6809 MRnumber = "54 9175", 6810 mrreviewer = "Daniel J. Rosenkrantz", 6811 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6812 acknowledgement = ack-nhfb, 6813 classcodes = "C4210 (Formal logic)", 6814 corpsource = "Univ. California, Los Angeles, CA, USA", 6815 keywords = "analysis; Boolean functions; boolean matrix method; conflict free matrix; context; context-free grammars; free parsing; linear precedence functions; matrix algebra; precedence grammars; syntax", 6816 treatment = "T Theoretical or Mathematical", 6817} 6818 6819@Article{OReagan:1972:CAC, 6820 author = "Robert T. O'Reagan", 6821 title = "Computer Assigned Codes from Verbal Responses", 6822 journal = j-CACM, 6823 volume = "15", 6824 number = "6", 6825 pages = "455--459", 6826 month = jun, 6827 year = "1972", 6828 CODEN = "CACMA2", 6829 ISSN = "0001-0782", 6830 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6831 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 6832 acknowledgement = ack-nhfb, 6833 classcodes = "C6130 (Data handling techniques)", 6834 corpsource = "US Bureau of the Census, Washington, DC, USA", 6835 keywords = "codes; computer coding; concept; data handling; historical response patterns; reference list; translation; verbal responses; word coding; word strings", 6836 treatment = "T Theoretical or Mathematical", 6837} 6838 6839@Article{Iguchi:1972:SMS, 6840 author = "K. Iguchi", 6841 title = "A starting method for solving nonlinear {Volterra} integral equations of the second kind", 6842 journal = j-CACM, 6843 volume = "15", 6844 number = "6", 6845 pages = "460--461", 6846 month = jun, 6847 year = "1972", 6848 CODEN = "CACMA2", 6849 ISSN = "0001-0782", 6850 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6851 acknowledgement = ack-nhfb, 6852 classcodes = "C4160 (Numerical integration and differentiation)", 6853 corpsource = "Nagoya Univ., Japan", 6854 keywords = "algorithm; fourth order method; integral equations; nonlinear Volterra integral equations; numerical methods; starting method", 6855 treatment = "T Theoretical or Mathematical", 6856} 6857 6858@Article{Pohl:1972:SPC, 6859 author = "I. Pohl", 6860 title = "A Sorting Problem and Its Complexity", 6861 journal = j-CACM, 6862 volume = "15", 6863 number = "6", 6864 pages = "462--464", 6865 month = jun, 6866 year = "1972", 6867 CODEN = "CACMA2", 6868 ISSN = "0001-0782", 6869 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6870 abstract = "A technique for proving min-max norms of sorting algorithms is given. One new algorithm for finding the minimum and maximum elements of a set with fewest comparisons is proved optimal with this technique.", 6871 acknowledgement = ack-nhfb, 6872 classcodes = "C6130 (Data handling techniques)", 6873 corpsource = "Univ. California, Santa Cruz, CA, USA", 6874 keywords = "complexity; computational; computational combinatorics; computational combinatories; computational complexity; minimax norms; minimum and maximum elements; sorting", 6875 treatment = "T Theoretical or Mathematical", 6876} 6877 6878@Article{Kolbig:1972:CAC, 6879 author = "K. S. Kolbig", 6880 title = "Certification of algorithm 363 (complex error function)", 6881 journal = j-CACM, 6882 volume = "15", 6883 number = "6", 6884 pages = "465--466", 6885 month = jun, 6886 year = "1972", 6887 CODEN = "CACMA2", 6888 ISSN = "0001-0782", 6889 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6890 acknowledgement = ack-nhfb, 6891 classcodes = "C4120 (Functional analysis); C7310 (Mathematics computing)", 6892 corpsource = "CERN, Geneva, Switzerland", 6893 keywords = "complex error function; function evaluation; special functions; subroutines; Voigt function", 6894 treatment = "T Theoretical or Mathematical", 6895} 6896 6897@Article{Niessner:1972:RAE, 6898 author = "H. Niessner", 6899 title = "Remark on algorithm 343 (Eigenvalues and eigenvectors of a real general matrix)", 6900 journal = j-CACM, 6901 volume = "15", 6902 number = "6", 6903 pages = "466--466", 6904 month = jun, 6905 year = "1972", 6906 CODEN = "CACMA2", 6907 ISSN = "0001-0782", 6908 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6909 acknowledgement = ack-nhfb, 6910 classcodes = "C4140 (Linear algebra); C7310 (Mathematics computing)", 6911 corpsource = "Brown, Boveri and Co., Baden, Switzerland", 6912 keywords = "eigenvalues; eigenvalues and eigenfunctions; eigenvectors; FORTRAN; general; matrices; matrix algebra; nonsymmetric matrices; QR algorithm; subroutines", 6913 treatment = "T Theoretical or Mathematical", 6914} 6915 6916@Article{Proll:1972:RAA, 6917 author = "L. G. Proll", 6918 title = "Remark on ``{ACM Algorithm 370 (General random number generator) [G5]''}", 6919 journal = j-CACM, 6920 volume = "15", 6921 number = "6", 6922 pages = "467--468", 6923 month = jun, 6924 year = "1972", 6925 CODEN = "CACMA2", 6926 ISSN = "0001-0782", 6927 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6928 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib", 6929 acknowledgement = ack-nhfb, 6930 classcodes = "C7890 (Other special applications of computing)", 6931 corpsource = "Univ. Southampton, UK", 6932 country = "USA", 6933 descriptors = "RVG;", 6934 enum = "7783", 6935 keywords = "cumulative distribution function; probability density function; random number generation; random number generator; subroutines; transformation", 6936 language = "English", 6937 references = "0", 6938 treatment = "G General Review", 6939} 6940 6941@Article{Schrack:1972:RAR, 6942 author = "G. F. Schrack", 6943 title = "Remark on algorithm 381 (Random vectors uniform in solid angle)", 6944 journal = j-CACM, 6945 volume = "15", 6946 number = "6", 6947 pages = "468--468", 6948 month = jun, 6949 year = "1972", 6950 CODEN = "CACMA2", 6951 ISSN = "0001-0782", 6952 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6953 acknowledgement = ack-nhfb, 6954 classcodes = "C7890 (Other special applications of computing)", 6955 corpsource = "Univ. British Columbia, Vancouver, BC, Canada", 6956 keywords = "points uniform on; random number generation; random vector generator; solid angle; sphere; spherically symmetric probability distribution; subroutines", 6957 treatment = "A Application", 6958} 6959 6960@Article{Sale:1972:RAS, 6961 author = "A. H. J. Sale", 6962 title = "Remark on algorithm 393 (Special series summation with arbitrary precision)", 6963 journal = j-CACM, 6964 volume = "15", 6965 number = "6", 6966 pages = "468--469", 6967 month = jun, 6968 year = "1972", 6969 CODEN = "CACMA2", 6970 ISSN = "0001-0782", 6971 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6972 acknowledgement = ack-nhfb, 6973 classcodes = "C4120 (Functional analysis); C7310 (Mathematics computing)", 6974 corpsource = "Univ. Sydney, NSW, Australia", 6975 keywords = "approximation; function evaluation; harmonic series; series summation; subroutines", 6976 treatment = "A Application", 6977} 6978 6979@Article{Einarsson:1972:RAC, 6980 author = "B. Einarsson", 6981 title = "Remark on algorithm 418 (Calculation of {Fourier} integrals)", 6982 journal = j-CACM, 6983 volume = "15", 6984 number = "6", 6985 pages = "469--469", 6986 month = jun, 6987 year = "1972", 6988 CODEN = "CACMA2", 6989 ISSN = "0001-0782", 6990 bibdate = "Tue Mar 25 13:26:09 MST 1997", 6991 acknowledgement = ack-nhfb, 6992 classcodes = "C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 6993 corpsource = "Res. Inst. Nat. Defense, Tumba, Sweden", 6994 keywords = "approximation; coefficients; Filon integration; Filon quadrature; Fourier; Fourier integrals; Fourier series; integration; numerical methods; quadrature; Richardson extrapolation; spline; splines (mathematics); subroutines", 6995 treatment = "T Theoretical or Mathematical", 6996} 6997 6998@Article{Johnson:1972:RAI, 6999 author = "S. C. Johnson and B. W. Kernighan", 7000 title = "Remark on algorithm 397 (An integer programming problem)", 7001 journal = j-CACM, 7002 volume = "15", 7003 number = "6", 7004 pages = "469--469", 7005 month = jun, 7006 year = "1972", 7007 CODEN = "CACMA2", 7008 ISSN = "0001-0782", 7009 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7010 acknowledgement = ack-nhfb, 7011 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C7310 (Mathematics computing)", 7012 corpsource = "Bell Labs., Murray Hill, NJ, USA", 7013 keywords = "change making problem; integer programming; subroutines", 7014 treatment = "A Application", 7015} 7016 7017@Article{Kandel:1972:CSV, 7018 author = "Abraham Kandel", 7019 title = "Computer Science --- {A} Vicious Circle", 7020 journal = j-CACM, 7021 volume = "15", 7022 number = "6", 7023 pages = "470--471", 7024 month = jun, 7025 year = "1972", 7026 CODEN = "CACMA2", 7027 ISSN = "0001-0782", 7028 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7029 acknowledgement = ack-nhfb, 7030 classcodes = "C0220 (Computing education and training)", 7031 corpsource = "New Mexico Inst. Mining and Technol., Socorro, NM, USA", 7032 keywords = "computer engineering; computer personnel; computer science curriculum; education; personnel; systems design", 7033 treatment = "G General Review", 7034} 7035 7036@Article{Koffman:1972:IIG, 7037 author = "E. B. Koffman", 7038 title = "Individualizing instruction in a generative {CAI} tutor", 7039 journal = j-CACM, 7040 volume = "15", 7041 number = "6", 7042 pages = "472--473", 7043 month = jun, 7044 year = "1972", 7045 CODEN = "CACMA2", 7046 ISSN = "0001-0782", 7047 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7048 acknowledgement = ack-nhfb, 7049 classcodes = "C0220 (Computing education and training); C7810C (Computer-aided instruction)", 7050 corpsource = "Univ. Connecticut, Storrs, CT, USA", 7051 keywords = "adaptive instruction; and sequential design; combinational; computer aided instruction; computer assisted instructions; education; generative CAI tutor; machine language programming", 7052 treatment = "A Application; P Practical", 7053} 7054 7055@Article{Houstis:1972:AAP, 7056 author = "E. N. Houstis and W. F. Mitchell and J. R. Rice", 7057 title = "{ACM} Algorithm 438: Product Type Two-point {Gauss-Legendre-Simpson}'s Integration", 7058 journal = j-CACM, 7059 volume = "15", 7060 number = "6", 7061 pages = "1071", 7062 month = jun, 7063 year = "1972", 7064 CODEN = "CACMA2", 7065 ISSN = "0001-0782", 7066 bibdate = "Thu Sep 08 09:34:02 1994", 7067} 7068 7069@Article{Revens:1972:FTF, 7070 author = "Lee Revens", 7071 title = "The first twenty-five years {ACM} 1947--1962", 7072 journal = j-CACM, 7073 volume = "15", 7074 number = "7", 7075 pages = "485--490", 7076 month = jul, 7077 year = "1972", 7078 CODEN = "CACMA2", 7079 ISSN = "0001-0782", 7080 MRclass = "68-03", 7081 MRnumber = "52 16081", 7082 bibdate = "Tue Dec 26 13:35:07 1995", 7083 note = "Twenty-fifth anniversary of the Association for Computing Machinery.", 7084 acknowledgement = ack-nhfb, 7085} 7086 7087@Article{Weiss:1972:PCI, 7088 author = "Eric A. Weiss", 7089 title = "Publications in computing: an informal review", 7090 journal = j-CACM, 7091 volume = "15", 7092 number = "7", 7093 pages = "491--497", 7094 month = jul, 7095 year = "1972", 7096 CODEN = "CACMA2", 7097 ISSN = "0001-0782", 7098 MRclass = "68-03", 7099 MRnumber = "52 16083", 7100 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7101 note = "Twenty-fifth anniversary of the Association for Computing Machinery.", 7102 acknowledgement = ack-nhfb, 7103 classcodes = "C0200 (General computer topics)", 7104 keywords = "digital computers; publications in computing; review", 7105 treatment = "B Bibliography", 7106} 7107 7108@Article{Ershov:1972:AHF, 7109 author = "A. P. Ershov", 7110 title = "Aesthetics and the Human Factor in Programming", 7111 journal = j-CACM, 7112 volume = "15", 7113 number = "7", 7114 pages = "501--505", 7115 month = jul, 7116 year = "1972", 7117 CODEN = "CACMA2", 7118 ISSN = "0001-0782", 7119 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7120 note = "See corrigendum \cite{Ershov:1972:CAH}.", 7121 acknowledgement = ack-nhfb, 7122 classcodes = "C6110 (Systems analysis and programming)", 7123 corpsource = "Novosibirsk Univ., USSR", 7124 keywords = "aesthetics; human factor; human factors; programming", 7125 treatment = "G General Review", 7126} 7127 7128@Article{Anonymous:1972:ISI, 7129 author = "Anonymous", 7130 title = "As the industry sees it", 7131 journal = j-CACM, 7132 volume = "15", 7133 number = "7", 7134 pages = "506--517", 7135 month = jul, 7136 year = "1972", 7137 CODEN = "CACMA2", 7138 ISSN = "0001-0782", 7139 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7140 acknowledgement = ack-nhfb, 7141 classcodes = "C0200 (General computer topics)", 7142 keywords = "digital computers; future of computers; industry", 7143 treatment = "G General Review", 7144} 7145 7146@Article{Arbib:1972:TAT, 7147 author = "Michael A. Arbib", 7148 title = "Toward an Automata Theory of Brains", 7149 journal = j-CACM, 7150 volume = "15", 7151 number = "7", 7152 pages = "521--527", 7153 month = jul, 7154 year = "1972", 7155 CODEN = "CACMA2", 7156 ISSN = "0001-0782", 7157 MRclass = "68A25 (92A05)", 7158 MRnumber = "53 7131", 7159 mrreviewer = "Jill Humphries", 7160 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7161 note = "Twenty-fifth anniversary of the Association for Computing Machinery.", 7162 acknowledgement = ack-nhfb, 7163 classcodes = "C4220 (Automata theory)", 7164 corpsource = "Univ. Massachusetts, Amherst, MA, USA", 7165 keywords = "automata theory; brain models; brains", 7166 treatment = "T Theoretical or Mathematical", 7167} 7168 7169@Article{Manna:1972:FAT, 7170 author = "Zohar Manna and Jean Vuillemin", 7171 title = "Fixpoint Approach to the Theory of Computation", 7172 journal = j-CACM, 7173 volume = "15", 7174 number = "7", 7175 pages = "528--536", 7176 month = jul, 7177 year = "1972", 7178 CODEN = "CACMA2", 7179 ISSN = "0001-0782", 7180 MRclass = "68A05", 7181 MRnumber = "55 13859", 7182 mrreviewer = "Andrea Maggiolo-Schettini", 7183 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7184 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 7185 note = "Twenty-fifth anniversary of the Association for Computing Machinery.", 7186 abstract = "Following the fix point theory of Scott, the semantics of computer programs are defined in terms of the least fix points of recursive programs. This allows not only the justification of all existing verification techniques, but also their extension to the handling, in a uniform manner of various properties of computer programs, including correctness, termination, and equivalence.", 7187 acknowledgement = ack-nhfb, 7188 classcodes = "C4290 (Other computer theory)", 7189 corpsource = "Stanford Univ., CA, USA", 7190 keywords = "computation; computational induction; computational linguistics; correctness; equivalence; fixpoints; least; least fix points; program diagnostics; programming; recursive programs; semantics of computer programs; semantics of programming languages; termination; theory; verification techniques", 7191 treatment = "T Theoretical or Mathematical", 7192} 7193 7194@Article{Traub:1972:NMC, 7195 author = "J. F. Traub", 7196 title = "Numerical Mathematics and Computer Science", 7197 journal = j-CACM, 7198 volume = "15", 7199 number = "7", 7200 pages = "537--541", 7201 month = jul, 7202 year = "1972", 7203 CODEN = "CACMA2", 7204 ISSN = "0001-0782", 7205 MRclass = "65-03", 7206 MRnumber = "54 4031", 7207 mrreviewer = "R. H. Bartels", 7208 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7209 note = "Twenty-fifth anniversary of the Association for Computing Machinery.", 7210 acknowledgement = ack-nhfb, 7211 classcodes = "C4100 (Numerical analysis)", 7212 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 7213 keywords = "algorithms; computer science; foundations; numerical mathematics; numerical methods; reviews; synthesis and analysis", 7214 treatment = "G General Review", 7215} 7216 7217@Article{Shanno:1972:MSV, 7218 author = "David F. Shanno and Roman L. Weil", 7219 title = "Management science: a view from nonlinear programming", 7220 journal = j-CACM, 7221 volume = "15", 7222 number = "7", 7223 pages = "542--549", 7224 month = jul, 7225 year = "1972", 7226 CODEN = "CACMA2", 7227 ISSN = "0001-0782", 7228 MRclass = "90C10 (90C30)", 7229 MRnumber = "55 9970", 7230 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7231 note = "Twenty-fifth anniversary of the Association for Computing Machinery.", 7232 acknowledgement = ack-nhfb, 7233 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)", 7234 corpsource = "Univ. Toronto, Ont., Canada", 7235 keywords = "integer; management science; mathematical programming; nonlinear programming; reviews", 7236 treatment = "B Bibliography; G General Review", 7237} 7238 7239@Article{Moses:1972:TGT, 7240 author = "Joel Moses", 7241 title = "Toward a General Theory of Special Functions", 7242 journal = j-CACM, 7243 volume = "15", 7244 number = "7", 7245 pages = "550--556 (or 550--554??)", 7246 month = jul, 7247 year = "1972", 7248 CODEN = "CACMA2", 7249 ISSN = "0001-0782", 7250 MRclass = "34-02 12H05", 7251 MRnumber = "53 3384", 7252 mrreviewer = "K. Okugawa", 7253 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7254 note = "Twenty-fifth anniversary of the Association for Computing Machinery.", 7255 acknowledgement = ack-nhfb, 7256 classcodes = "C1100 (Mathematical techniques)", 7257 keywords = "general theory; mathematics; special functions", 7258 treatment = "T Theoretical or Mathematical", 7259} 7260 7261@Article{Foster:1972:VCA, 7262 author = "C. C. Foster", 7263 title = "A view of computer architecture", 7264 journal = j-CACM, 7265 volume = "15", 7266 number = "7", 7267 pages = "557--565", 7268 month = jul, 7269 year = "1972", 7270 CODEN = "CACMA2", 7271 ISSN = "0001-0782", 7272 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7273 acknowledgement = ack-nhfb, 7274 classcodes = "C5220 (Computer architecture)", 7275 corpsource = "Univ. Massachusetts, Amherst, MA, USA", 7276 keywords = "computer architecture; microcomputers; predict; reviews", 7277 treatment = "G General Review", 7278} 7279 7280@Article{Fraser:1972:IBC, 7281 author = "A. G. Fraser", 7282 title = "On the interface between computers and data communications systems", 7283 journal = j-CACM, 7284 volume = "15", 7285 number = "7", 7286 pages = "566--573", 7287 month = jul, 7288 year = "1972", 7289 CODEN = "CACMA2", 7290 ISSN = "0001-0782", 7291 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7292 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/network.bib", 7293 abstract = "Reproduced in Advances in Computer Commun., Chu,W.W (Ed.), (1974), 246-253.", 7294 acknowledgement = ack-nhfb, 7295 classcodes = "C5610 (Computer interfaces)", 7296 corpsource = "Bell Telephone Labs. Inc., Murray Hill, NJ, USA", 7297 keywords = "computer interfaces; computers; data communication systems; data communications; interface; specifying", 7298 treatment = "P Practical", 7299} 7300 7301@Article{BrinchHansen:1972:SM, 7302 author = "Per {Brinch Hansen}", 7303 title = "Structured Multiprogramming", 7304 journal = j-CACM, 7305 volume = "15", 7306 number = "7", 7307 pages = "574--578", 7308 month = jul, 7309 year = "1972", 7310 CODEN = "CACMA2", 7311 ISSN = "0001-0782", 7312 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7313 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib and ftp://ftp.ira.uka.de/pub/bibliography/Os/os.bib", 7314 acknowledgement = ack-nhfb, 7315 annote = "This paper presents a proposal for structured representation of multiprogramming in a high level language. Shared variables are introduced, and their role in `critical regions (denoted by the structured statement region var do Statement') is discussed. A synchronization primitive `await Boolean' delays a process until the components of a shared variable satisfy the boolean expression. For explicit control of the scheduling of resources, an event queue is associated with a shared variable, and two procedures await (event) (leave a critical region associated with the shared variable and join the event queue) and cause (event) (enable all processes in the event queue to reenter their critical regions) are provided, which can control process scheduling to any degree desired.", 7316 classcodes = "C6150J (Operating systems)", 7317 corpsource = "California Inst. Technol., Pasadena, CA, USA", 7318 keywords = "concurrency", 7319 keywords = "critical regions; event variables; high level; language; multiprogramming; operating systems; structured multiprogramming", 7320 treatment = "P Practical", 7321} 7322 7323@Article{Lynch:1972:OSP, 7324 author = "W. C. Lynch", 7325 title = "Operating system performance", 7326 journal = j-CACM, 7327 volume = "15", 7328 number = "7", 7329 pages = "579--585", 7330 month = jul, 7331 year = "1972", 7332 CODEN = "CACMA2", 7333 ISSN = "0001-0782", 7334 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7335 acknowledgement = ack-nhfb, 7336 classcodes = "C6150J (Operating systems)", 7337 corpsource = "Case Western Res. Univ., Cleveland, OH, USA", 7338 keywords = "computer; model; operating system performance; operating systems (computers); reviews; systems; total system", 7339 treatment = "G General Review", 7340} 7341 7342@Article{Kimbleton:1972:RCS, 7343 author = "S. R. Kimbleton", 7344 title = "The role of computer system models in performance evaluation", 7345 journal = j-CACM, 7346 volume = "15", 7347 number = "7", 7348 pages = "586--590", 7349 month = jul, 7350 year = "1972", 7351 CODEN = "CACMA2", 7352 ISSN = "0001-0782", 7353 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7354 acknowledgement = ack-nhfb, 7355 classcodes = "C0310 (EDP management); C1220 (Simulation, modelling and identification); C6150J (Operating systems)", 7356 corpsource = "UNIV. Michigan, Ann Arbor, MI, USA", 7357 keywords = "computer selection and evaluation; computer system models; evaluation; modelling; operating; operating systems; performance; systems (computers)", 7358 treatment = "P Practical", 7359} 7360 7361@Article{Rosen:1972:PSL, 7362 author = "Saul Rosen", 7363 title = "Programming Systems and Languages (1965--1975)", 7364 journal = j-CACM, 7365 volume = "15", 7366 number = "7", 7367 pages = "591--600", 7368 month = jul, 7369 year = "1972", 7370 CODEN = "CACMA2", 7371 ISSN = "0001-0782", 7372 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7373 abstract = "In spite of impressive gains by PL/I, Fortran and Cobol remain the languages in which most of the world's production programs are written and will remain so into the foreseeable future. There is a great deal of theoretical interest in Algol 68 and in extensible languages, but so far at least they have had little practical impact. Problem-oriented languages may very well become the most important language development area in the next five to ten years.\par In the operating system area all major computer manufacturers set out to produce very ambitious multiprogramming systems, and they all ran into similar problems. A number of university projects,though not directly comparable to those of the manufacturers, have contributed greatly to a better understanding of operating system principles. Important trends include the increased interest in the development of system measurement and evaluation techniques,and increased use of microprogramming for some programming system functions.", 7374 acknowledgement = ack-nhfb, 7375 classcodes = "C6140 (Programming languages); C6150J (Operating systems)", 7376 corpsource = "Purdue Univ., Lafayette, IN, USA", 7377 keywords = "history; languages; microprogramming; multiprogramming; operating system; operating systems; operating systems (computers); problem oriented languages; programming; programming systems; reviews", 7378 treatment = "G General Review", 7379} 7380 7381@Article{Sammet:1972:PLH, 7382 author = "Jean E. Sammet", 7383 title = "Programming Languages: History and Future", 7384 journal = j-CACM, 7385 volume = "15", 7386 number = "7", 7387 pages = "601--610", 7388 month = jul, 7389 year = "1972", 7390 CODEN = "CACMA2", 7391 ISSN = "0001-0782", 7392 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7393 abstract = "This paper discusses both the history and future of programming languages (= higher level languages). \par Some of the difficulties in writing such a history are indicated. A key part of the paper is a tree showing the chronological development of languages and their interrelationships. Reasons for the proliferation of languages are given. The major languages are listed with the reasons for their importance. A section on chronology indicates the happenings of the significant previous time periods and the major topics of 1972. Key concepts other than specific languages are discussed.", 7394 acknowledgement = ack-nhfb, 7395 classcodes = "C6140 (Programming languages)", 7396 corpsource = "IBM Corp., Cambridge, MA, USA", 7397 keywords = "chronological; development; future; future directions; higher level languages; history; language interrelationships; languages; programming language future; programming language history; programming language tree; programming languages; reviews", 7398 treatment = "G General Review", 7399} 7400 7401@Article{Fosdick:1972:PBM, 7402 author = "L. D. Fosdick", 7403 title = "The production of better mathematical software", 7404 journal = j-CACM, 7405 volume = "15", 7406 number = "7", 7407 pages = "611--617", 7408 month = jul, 7409 year = "1972", 7410 CODEN = "CACMA2", 7411 ISSN = "0001-0782", 7412 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7413 acknowledgement = ack-nhfb, 7414 classcodes = "C6110 (Systems analysis and programming)", 7415 corpsource = "Univ. Colorado, Boulder, CO, USA", 7416 keywords = "computer software; mathematical software; mathematics; production; programming", 7417 treatment = "G General Review", 7418} 7419 7420@Article{Bobrow:1972:RAP, 7421 author = "D. G. Bobrow", 7422 title = "Requirements for Advanced Programming Systems for List Processing", 7423 journal = j-CACM, 7424 volume = "15", 7425 number = "7", 7426 pages = "618--627", 7427 month = jul, 7428 year = "1972", 7429 CODEN = "CACMA2", 7430 ISSN = "0001-0782", 7431 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7432 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Ai/lisp.bib", 7433 acknowledgement = ack-nhfb, 7434 classcodes = "C6130 (Data handling techniques)", 7435 corpsource = "Xerox, Palo Alto, CA, USA", 7436 keywords = "advanced programming systems; list processing; requirements", 7437} 7438 7439@Article{Bachman:1972:ESS, 7440 author = "Charles W. Bachman", 7441 title = "The Evolution of Storage Structures", 7442 journal = j-CACM, 7443 volume = "15", 7444 number = "7", 7445 pages = "628--634", 7446 month = jul, 7447 year = "1972", 7448 CODEN = "CACMA2", 7449 ISSN = "0001-0782", 7450 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7451 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 7452 acknowledgement = ack-nhfb, 7453 annote = "Good overview of basic definitions and their relationships", 7454 classcodes = "C6120 (File organisation)", 7455 corpsource = "Honeywell Information Systems, Billerica, MA, USA", 7456 keywords = "data base management systems; Data Structure Diagram graphic technique; data structures; evolution; storage management; storage structures", 7457 treatment = "P Practical", 7458} 7459 7460@Article{Rice:1972:PFS, 7461 author = "J. R. Rice", 7462 title = "On the present and future of scientific computation", 7463 journal = j-CACM, 7464 volume = "15", 7465 number = "7", 7466 pages = "637--639", 7467 month = jul, 7468 year = "1972", 7469 CODEN = "CACMA2", 7470 ISSN = "0001-0782", 7471 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7472 acknowledgement = ack-nhfb, 7473 classcodes = "C7320 (Physics and chemistry computing); C7490 (Computing in other engineering fields)", 7474 corpsource = "Purdue Univ., Lafayette, IN, USA", 7475 keywords = "engineering applications of computers; future; natural sciences; physical sciences; physics; present; scientific computation", 7476 treatment = "G General Review", 7477} 7478 7479@Article{Benjamin:1972:GPI, 7480 author = "Robert I. Benjamin", 7481 title = "A generational perspective of information system development", 7482 journal = j-CACM, 7483 volume = "15", 7484 number = "7", 7485 pages = "640--643", 7486 month = jul, 7487 year = "1972", 7488 CODEN = "CACMA2", 7489 ISSN = "0001-0782", 7490 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7491 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 7492 acknowledgement = ack-nhfb, 7493 classcodes = "C7100 (Business and administration)", 7494 corpsource = "Xerox Corp., Rochester, NY, USA", 7495 keywords = "computing milieu; generational perspective; information system development; management data processing; management information systems", 7496 treatment = "G General Review", 7497} 7498 7499@Article{Sedelow:1972:LAH, 7500 author = "S. Y. Sedelow", 7501 title = "Language analysis in the humanities", 7502 journal = j-CACM, 7503 volume = "15", 7504 number = "7", 7505 pages = "644--647", 7506 month = jul, 7507 year = "1972", 7508 CODEN = "CACMA2", 7509 ISSN = "0001-0782", 7510 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7511 acknowledgement = ack-nhfb, 7512 classcodes = "C7820 (Humanities computing)", 7513 corpsource = "Univ. Kansas, Lawrence, KS, USA", 7514 keywords = "concordances; humanities; indices; language analysis; language translation and linguistics; pattern generation; pattern recognition", 7515 treatment = "P Practical", 7516} 7517 7518@Article{Zinn:1972:CIP, 7519 author = "K. L. Zinn", 7520 title = "Computers in the instructional process: directions for research and development", 7521 journal = j-CACM, 7522 volume = "15", 7523 number = "7", 7524 pages = "648--651", 7525 month = jul, 7526 year = "1972", 7527 CODEN = "CACMA2", 7528 ISSN = "0001-0782", 7529 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7530 acknowledgement = ack-nhfb, 7531 classcodes = "C7810C (Computer-aided instruction)", 7532 corpsource = "Univ. Michigan, Ann Arbor, MI, USA", 7533 keywords = "computer aided instruction; computers; development; directions; education; instructional process; research and", 7534 treatment = "G General Review", 7535} 7536 7537@Article{Sturman:1972:CUS, 7538 author = "G. M. Sturman", 7539 title = "Computers and urban society", 7540 journal = j-CACM, 7541 volume = "15", 7542 number = "7", 7543 pages = "652--657", 7544 month = jul, 7545 year = "1972", 7546 CODEN = "CACMA2", 7547 ISSN = "0001-0782", 7548 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7549 acknowledgement = ack-nhfb, 7550 classcodes = "C7000 (Computer applications); C7130 (Public administration)", 7551 corpsource = "Parsons Brinckerhoff Quade and Douglas Inc., NY, USA", 7552 keywords = "administrative data processing; brief survey; computers; engineering analysis; engineering applications of computers; government; information systems; sciences; social and behavioural; urban society; urban systems", 7553 treatment = "P Practical", 7554} 7555 7556@Article{Salton:1972:DDP, 7557 author = "G. Salton", 7558 title = "Dynamic document processing", 7559 journal = j-CACM, 7560 volume = "15", 7561 number = "7", 7562 pages = "658--668", 7563 month = jul, 7564 year = "1972", 7565 CODEN = "CACMA2", 7566 ISSN = "0001-0782", 7567 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7568 acknowledgement = ack-nhfb, 7569 classcodes = "C7250 (Information storage and retrieval)", 7570 corpsource = "Cornell Univ., Ithaca, NY, USA", 7571 keywords = "automatic; automatic indexing; automatic search and; clustered files; collection growth; dynamic document; indexing; information; information retrieval; interactive user controlled search process; iterative searching; library automation; library mechanisation; processing; query modification; retrieval", 7572 treatment = "P Practical", 7573} 7574 7575@Article{Knuth:1972:ABA, 7576 author = "Donald E. Knuth", 7577 title = "Ancient {Babylonian} algorithms", 7578 journal = j-CACM, 7579 volume = "15", 7580 number = "7", 7581 pages = "671--677", 7582 month = jul, 7583 year = "1972", 7584 CODEN = "CACMA2", 7585 ISSN = "0001-0782", 7586 MRnumber = "52 13132", 7587 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7588 note = "Twenty-fifth anniversary of the Association for Computing Machinery. See errata \cite{Knuth:1976:EAB}.", 7589 acknowledgement = ack-nhfb, 7590 classcodes = "C1100 (Mathematical techniques)", 7591 corpsource = "Stanford Univ., CA, USA", 7592 keywords = "ancient Babylonian algorithms; Babylonian; computer science; history of computation; mathematics; origins of mathematics; sexagesimal number system; tablets", 7593 treatment = "T Theoretical or Mathematical", 7594} 7595 7596@Article{Bauer:1972:PKZ, 7597 author = "F. L. Bauer and H. W{\"o}ssner and Konrad Zuse", 7598 title = "The ``Plankalk{\"u}l'' of {Konrad Zuse}: a forerunner of today's programming languages.", 7599 journal = j-CACM, 7600 volume = "15", 7601 number = "7", 7602 pages = "678--685", 7603 month = jul, 7604 year = "1972", 7605 CODEN = "CACMA2", 7606 ISSN = "0001-0782", 7607 MRclass = "68A05 (68-03)", 7608 MRnumber = "52 16093", 7609 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7610 note = "Twenty-fifth anniversary of the Association for Computing Machinery.", 7611 acknowledgement = ack-nhfb, 7612 classcodes = "C6140 (Programming languages)", 7613 corpsource = "Tech. Univ. M{\"u}nchen, West Germany", 7614 keywords = "history of; Konrad Zuse; languages; notational and conceptual system; Plankalkul; programming; programming languages; programming theory", 7615 treatment = "G General Review", 7616} 7617 7618@Article{Sprague:1972:WVC, 7619 author = "Richard E. Sprague", 7620 title = "A {Western} View of Computer History", 7621 journal = j-CACM, 7622 volume = "15", 7623 number = "7", 7624 pages = "686--692", 7625 month = jul, 7626 year = "1972", 7627 CODEN = "CACMA2", 7628 ISSN = "0001-0782", 7629 MRclass = "68-03", 7630 MRnumber = "52 16082", 7631 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7632 note = "Twenty-fifth anniversary of the Association for Computing Machinery.", 7633 acknowledgement = ack-nhfb, 7634 classcodes = "C0200 (General computer topics)", 7635 corpsource = "Litton ARS, Morristown, NJ, USA", 7636 keywords = "1945 to 1955; computer history; digital computers", 7637 treatment = "G General Review", 7638} 7639 7640@Article{Alt:1972:ACR, 7641 author = "Franz L. Alt", 7642 title = "Archaeology of computers --- reminiscences, 1945--1947", 7643 journal = j-CACM, 7644 volume = "15", 7645 number = "7", 7646 pages = "693--694", 7647 month = jul, 7648 year = "1972", 7649 CODEN = "CACMA2", 7650 ISSN = "0001-0782", 7651 MRclass = "68-03", 7652 MRnumber = "52 16079", 7653 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7654 note = "Twenty-fifth anniversary of the Association for Computing Machinery", 7655 acknowledgement = ack-nhfb, 7656 classcodes = "C5420 (Mainframes and minicomputers)", 7657 corpsource = "American Inst. Phys., NY, USA", 7658 keywords = "1945 to 1947; digital computers; ENIAC; history of computers; reminiscences; special purpose computers", 7659 treatment = "G General Review", 7660} 7661 7662@Article{Borodin:1972:CE, 7663 author = "A. Borodin and C. C. Gotlieb", 7664 title = "Computers and employment", 7665 journal = j-CACM, 7666 volume = "15", 7667 number = "7", 7668 pages = "695--702", 7669 month = jul, 7670 year = "1972", 7671 CODEN = "CACMA2", 7672 ISSN = "0001-0782", 7673 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7674 acknowledgement = ack-nhfb, 7675 classcodes = "C0200 (General computer topics)", 7676 corpsource = "Univ. Toronto, Ont., Canada", 7677 keywords = "computers; economic and sociological effects; employment; social implications; unemployment", 7678 treatment = "G General Review", 7679} 7680 7681@Article{Herriot:1972:MGF, 7682 author = "John G. Herriot", 7683 title = "In memory of {George E. Forsythe}", 7684 journal = j-CACM, 7685 volume = "15", 7686 number = "8", 7687 pages = "719--720", 7688 month = aug, 7689 year = "1972", 7690 CODEN = "CACMA2", 7691 ISSN = "0001-0782", 7692 MRclass = "01A70", 7693 MRnumber = "52 7801", 7694 bibdate = "Tue Dec 26 13:35:07 1995", 7695 note = "Collection of articles in honor of {George E. Forsythe} ({ACM} Student Competition Award Papers).", 7696 acknowledgement = ack-nhfb, 7697} 7698 7699@Article{Knuth:1972:GFD, 7700 author = "Donald E. Knuth", 7701 title = "{George Forsythe} and the development of Computer Science", 7702 journal = j-CACM, 7703 volume = "15", 7704 number = "8", 7705 pages = "721--726", 7706 month = aug, 7707 year = "1972", 7708 CODEN = "CACMA2", 7709 ISSN = "0001-0782", 7710 MRclass = "01A70 (68-03)", 7711 MRnumber = "52 7802", 7712 bibdate = "Tue Dec 26 13:35:07 1995", 7713 note = "Collection of articles in honor of {George E. Forsythe} ({ACM} Student Competition Award Papers).", 7714 acknowledgement = ack-nhfb, 7715} 7716 7717@Article{Crowe:1972:GPA, 7718 author = "David Crowe", 7719 title = "Generating parsers for affix grammars. Collection of articles in honor of {George E. Forsythe (ACM Student Competition Award Papers)}", 7720 journal = j-CACM, 7721 volume = "15", 7722 number = "8", 7723 pages = "728--734", 7724 month = aug, 7725 year = "1972", 7726 CODEN = "CACMA2", 7727 ISSN = "0001-0782", 7728 MRclass = "68A30", 7729 MRnumber = "53 4635", 7730 mrreviewer = "Ole Lehrmann Madsen", 7731 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7732 bibsource = "Compendex database", 7733 abstract = "Koster, the inventor of affix grammars, suggests a top-down scheme for parsing them, based on recursive procedures. This paper presents a bottom-up scheme for parsing them, based on an extension of Floyd Production Language (FPL). Included is an algorithm, similar to that of DeRemer's, for covering a large class of affix grammars into FPL. The paper discusses the applicabilities of the conversion algorithm and affix grammars in general, and some possible extensions to Koster's definition of affix grammars.", 7734 acknowledgement = ack-nhfb, 7735 classcodes = "C4210 (Formal logic)", 7736 classification = "721; 723", 7737 corpsource = "Univ. British Columbia, Vancouver, BC, Canada", 7738 journalabr = "Commun ACM", 7739 keywords = "affix grammars; algorithmic language processing; algorithmic languages; automata theory --- Grammars; bottom up; computer metatheory; grammars; parsers; syntax directed compiling; translator writing systems; two level grammars", 7740 treatment = "T Theoretical or Mathematical", 7741} 7742 7743@Article{Helbig:1972:PRC, 7744 author = "Robert E. Helbig and Patrick K. Orr and Robert R. Roediger", 7745 title = "Political Redistricting by Computer", 7746 journal = j-CACM, 7747 volume = "15", 7748 number = "8", 7749 pages = "735--741", 7750 month = aug, 7751 year = "1972", 7752 CODEN = "CACMA2", 7753 ISSN = "0001-0782", 7754 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7755 bibsource = "Compendex database", 7756 abstract = "Criteria for acceptable redistricting are discussed, including population equality, compactness, contiguity, and preservation of natural and\slash or political boundaries. Only nonpartisan criteria are considered. Using 1970 Bureau of Census population data, specific results are given for the ten Congressional Districts in the state of Missouri and for the seven St. Louis county Council seats. Results from the use of the algorithm indicate the feasibility of political redistricting with the aid of a computer.", 7757 acknowledgement = ack-nhfb, 7758 classcodes = "C7810 (Social and behavioural sciences computing)", 7759 classification = "723", 7760 corpsource = "Washington Univ., St. Louis, MO, USA", 7761 journalabr = "Commun ACM", 7762 keywords = "algorithm; compactness; computer; contiguity; data processing, business; equal population; legislative districts; political redistricting; reapportionment; social and behavioural sciences; transportation", 7763 treatment = "A Application", 7764} 7765 7766@Article{Benjamin:1972:EES, 7767 author = "Arthur J. Benjamin", 7768 title = "Extensible Editor for a Small Machine with Disk Storage", 7769 journal = j-CACM, 7770 volume = "15", 7771 number = "8", 7772 pages = "742--747", 7773 month = aug, 7774 year = "1972", 7775 CODEN = "CACMA2", 7776 ISSN = "0001-0782", 7777 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7778 bibsource = "Compendex database", 7779 abstract = "A design philosophy for developing a sophisticated utility program is illustrated by the actual design and implementation of a text editor. A versatile data structure is employed so that only a small number of programmed subroutines are necessary for all types of data manipulation. Such a data structure is described, and its merits are illustrated by the ease with which powerful extensions can be implemented in terms of a few basic editing functions.", 7780 acknowledgement = ack-nhfb, 7781 classcodes = "C6120 (File organisation); C6130 (Data handling techniques); C6150E (General utility programs)", 7782 classification = "723", 7783 corpsource = "Brandeis Univ., Waltham, MA, USA", 7784 journalabr = "Commun ACM", 7785 keywords = "collection; command; computer programming --- Macros; computer systems programming --- Supervisory and Executive Programs; context searching; data processing; data storage, magnetic --- Disk Storage; data structures; design; disc storage; executive program; extensible editor; garbage; interpreter; list processing; macro language; paging; parameter substitution; philosophy; processing; programs; recursion; small machine; state table; storage allocation; string manipulation; text editing; text editor; utility; utility program; virtual memory", 7786 treatment = "P Practical", 7787} 7788 7789@Article{Rosin:1972:ERM, 7790 author = "Robert F. Rosin and Gideon Frieder and Richard H. {Eckhouse, Jr.}", 7791 title = "Environment for Research in Microprogramming and Emulation", 7792 journal = j-CACM, 7793 volume = "15", 7794 number = "8", 7795 pages = "748--760", 7796 month = aug, 7797 year = "1972", 7798 CODEN = "CACMA2", 7799 ISSN = "0001-0782", 7800 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7801 bibsource = "Compendex database", 7802 abstract = "The development of the research project in microprogramming and emulation at State University of New York at Buffalo consisted of three phases: the evaluation of various possible machines to support this research; the decision to purchase one such machine, which appears to be superior to the others considered; and the organization and definition of goals for each group in the project. Each of these phases is reported, with emphasis placed on the early results achieved in this research.", 7803 acknowledgement = ack-nhfb, 7804 classcodes = "C5220 (Computer architecture); C7430 (Computer engineering)", 7805 classification = "722; 723", 7806 corpsource = "State Univ. New York, Buffalo, NY, USA", 7807 journalabr = "Commun ACM", 7808 keywords = "computer architecture; computer systems; computer systems, digital; emulation; engineering applications of computers; environment for research; hardware evaluation; language processors; management; microprogramming; nanoprogram; project; simulation", 7809 treatment = "X Experimental", 7810} 7811 7812@Article{Oden:1972:MMC, 7813 author = "P. H. Oden and G. S. Shedler", 7814 title = "A Model of Memory Contention in a Paging Machine", 7815 journal = j-CACM, 7816 volume = "15", 7817 number = "8", 7818 pages = "761--771", 7819 month = aug, 7820 year = "1972", 7821 CODEN = "CACMA2", 7822 ISSN = "0001-0782", 7823 MRclass = "68A50", 7824 MRnumber = "55 13903", 7825 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7826 bibsource = "Compendex database", 7827 note = "Collection of articles in honor of {George E. Forsythe} ({ACM} Student Competition Award Papers).", 7828 abstract = "In the model presented, the number of page-frames of main memory allocated to a problem program varies in time. These changes in memory configuration are represented explicitly in the model, CPU requirements and page exception characteristics of program material being described statistically. Expressions for the distribution of the number of page-frames allocated to an executing program, the long run expected fraction of a program's execution time in a given number of page-frames, and the average execution interval of the multiprogrammed load are obtained. It is pointed out heuristically and demonstrated numerically that an increase is obtainable in the average execution interval of the multiprogrammed load over that resulting from equal fixed partitioning of main memory.", 7829 acknowledgement = ack-nhfb, 7830 classcodes = "C6120 (File organisation)", 7831 classification = "723", 7832 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 7833 journalabr = "Commun ACM", 7834 keywords = "computer operating systems; demand paging; file organisation; management; memory; memory contention; modelling; multiprogrammed; operating; paging machines; probability --- Queueing Theory; queuing analysis; storage; storage allocation; systems studies", 7835 treatment = "T Theoretical or Mathematical", 7836} 7837 7838@Article{Bernstein:1972:CFM, 7839 author = "H. J. Bernstein and H. T. Gladwin", 7840 title = "Compiling fixed-point multiplications", 7841 journal = j-CACM, 7842 volume = "15", 7843 number = "8", 7844 pages = "772--772", 7845 month = aug, 7846 year = "1972", 7847 CODEN = "CACMA2", 7848 ISSN = "0001-0782", 7849 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7850 acknowledgement = ack-nhfb, 7851 classcodes = "C5230 (Digital arithmetic methods); C6110 (Systems analysis and programming)", 7852 corpsource = "Brookhaven Nat. Lab., Upton, NY, USA", 7853 keywords = "compiling multiplications; digital arithmetic; fixed point arithmetic; programming", 7854 treatment = "P Practical", 7855} 7856 7857@Article{vanderPoel:1972:CCS, 7858 author = "W. L. {van der Poel}", 7859 title = "Comment on the composition of semantics in {Algol 68}", 7860 journal = j-CACM, 7861 volume = "15", 7862 number = "8", 7863 pages = "772--772", 7864 month = aug, 7865 year = "1972", 7866 CODEN = "CACMA2", 7867 ISSN = "0001-0782", 7868 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7869 acknowledgement = ack-nhfb, 7870 classcodes = "C6140D (High level languages)", 7871 corpsource = "Univ. Technol. Delft, Netherlands", 7872 keywords = "ALGOL; ALGOL 68; composition of semantics; data; design; programming languages; programming primitives; recursive composition; structures", 7873 treatment = "T Theoretical or Mathematical", 7874} 7875 7876@Article{Morris:1972:BVW, 7877 author = "James H. {Morris, Jr.}", 7878 title = "A Bonus from {van Wijngaarden}'s Device", 7879 journal = j-CACM, 7880 volume = "15", 7881 number = "8", 7882 pages = "773--773", 7883 month = aug, 7884 year = "1972", 7885 CODEN = "CACMA2", 7886 ISSN = "0001-0782", 7887 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7888 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/reynolds.bib", 7889 acknowledgement = ack-nhfb, 7890 classcodes = "C6140D (High level languages)", 7891 corpsource = "Univ. California, Berkeley, CA, USA", 7892 keywords = "ALGOL; ALGOL 60 programs; eliminate all labels; nonlocal transfers; procedure returns", 7893 treatment = "P Practical", 7894} 7895 7896@Article{Jones:1972:CAB, 7897 author = "P. R. Jones", 7898 title = "Comment on average binary search length", 7899 journal = j-CACM, 7900 volume = "15", 7901 number = "8", 7902 pages = "774--774", 7903 month = aug, 7904 year = "1972", 7905 CODEN = "CACMA2", 7906 ISSN = "0001-0782", 7907 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7908 acknowledgement = ack-nhfb, 7909 classcodes = "C6130 (Data handling techniques)", 7910 keywords = "binary searching; data handling; record retrieval; search length", 7911 treatment = "P Practical", 7912} 7913 7914@Article{Read:1972:NGR, 7915 author = "Ronald C. Read and K. Harada", 7916 title = "A note on the generation of rosary permutations. With a response by {K. Harada}", 7917 journal = j-CACM, 7918 volume = "15", 7919 number = "8", 7920 pages = "775--775", 7921 month = aug, 7922 year = "1972", 7923 CODEN = "CACMA2", 7924 ISSN = "0001-0782", 7925 MRclass = "68A10", 7926 MRnumber = "53 9706", 7927 mrreviewer = "Dennis White", 7928 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7929 note = "Collection of articles in honor of {George E. Forsythe} ({ACM} Student Competition Award Papers).", 7930 acknowledgement = ack-nhfb, 7931 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics)", 7932 corpsource = "Univ. Waterloo, Ont., Canada", 7933 keywords = "associating an integer; combinatorial mathematics; generation; rosary permutations", 7934 treatment = "T Theoretical or Mathematical", 7935} 7936 7937@Article{Squire:1972:AAL, 7938 author = "W. Squire", 7939 title = "{ACM} Algorithm 429: Localization of the Roots of a Polynomial", 7940 journal = j-CACM, 7941 volume = "15", 7942 number = "8", 7943 pages = "776--777", 7944 month = aug, 7945 year = "1972", 7946 CODEN = "CACMA2", 7947 ISSN = "0001-0782", 7948 bibdate = "Thu Sep 08 09:34:06 1994", 7949} 7950 7951@Article{PurdomJr:1972:AAI, 7952 author = "P. W. {Purdom Jr.} and E. F. Moore", 7953 title = "{ACM} Algorithm 430: Immediate Predominators in a Directed Graph", 7954 journal = j-CACM, 7955 volume = "15", 7956 number = "8", 7957 pages = "777--778", 7958 month = aug, 7959 year = "1972", 7960 CODEN = "CACMA2", 7961 ISSN = "0001-0782", 7962 bibdate = "Thu Sep 08 09:34:05 1994", 7963} 7964 7965@Article{Levitt:1972:CAS, 7966 author = "K. N. Levitt and W. H. Kautz", 7967 title = "Cellular Arrays for the Solution of Graph Problems", 7968 journal = j-CACM, 7969 volume = "15", 7970 number = "9", 7971 pages = "789--801", 7972 month = sep, 7973 year = "1972", 7974 CODEN = "CACMA2", 7975 ISSN = "0001-0782", 7976 bibdate = "Tue Mar 25 13:26:09 MST 1997", 7977 bibsource = "Compendex database", 7978 abstract = "Several parallelized algorithms are presented for the solution of certain spanning tree, distance, and path problems, with direct applications to wire routing, PERT chart analysis, and the analysis of many types of networks. These algorithms exhibit a computation time that in many cases grows at a rate not exceeding log//2 n, where n is the number of nodes in the graph. Straightforward cellular implementations of the well-known serial algorithms for these problems require about n steps, and noncellular implementations require from n**2 to n**3 steps.", 7979 acknowledgement = ack-nhfb, 7980 classcodes = "C5420 (Mainframes and minicomputers); C7310 (Mathematics computing)", 7981 classification = "722; 723", 7982 corpsource = "Stanford Res. Inst., Menlo Park, CA, USA", 7983 journalabr = "Commun ACM", 7984 keywords = "cellular arrays; data storage, digital; graph problems; graph theory; mathematical techniques --- Graph Theory; special purpose computers", 7985 treatment = "A Application", 7986} 7987 7988@Article{Ghosh:1972:FOC, 7989 author = "Sakti P. Ghosh", 7990 title = "File Organization --- The Consecutive Retrieval Property", 7991 journal = j-CACM, 7992 volume = "15", 7993 number = "9", 7994 pages = "802--808", 7995 month = sep, 7996 year = "1972", 7997 CODEN = "CACMA2", 7998 ISSN = "0001-0782", 7999 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8000 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 8001 abstract = "Some important theorems on the consecutive retrieval property are proved. Conditions under which the consecutive retrieval property exists and remain invariant have been established. An outline for designing an information retrieval system based on the consecutive retrieval property is discussed.", 8002 acknowledgement = ack-nhfb, 8003 classcodes = "C6120 (File organisation)", 8004 classification = "721; 723", 8005 corpsource = "IBM, San Jose, CA, USA", 8006 journalabr = "Commun ACM", 8007 keywords = "consecutive; consecutive retrieval; data processing; file organisation; file organization; information retrieval; information retrieval system; information retrieval systems; minimum access; query structure; record; storage; storage on tapes; storage space; structure; time", 8008 treatment = "T Theoretical or Mathematical", 8009} 8010 8011@Article{Mor:1972:NAA, 8012 author = "M. Mor and T. Lamdan", 8013 title = "A New Approach to Automatic Scanning of Contour Maps", 8014 journal = j-CACM, 8015 volume = "15", 8016 number = "9", 8017 pages = "809--812", 8018 month = sep, 8019 year = "1972", 8020 CODEN = "CACMA2", 8021 ISSN = "0001-0782", 8022 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8023 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.75.bib", 8024 abstract = "The structure of a general contour map is analyzed, and its topological properties are utilized in developing a new scanning algorithm. The problem of detection and recognition of contour lines is solved by a two color labeling method. It is shown that for maps containing normal contour lines only, it suffices to distinguish between so-called ``even'' and ``odd'' lines. The ``tangency problem'' involved in practical scanning is discussed, and a solution base on minimizing computer memory space and simplifying control program is suggested.", 8025 acknowledgement = ack-nhfb, 8026 classcodes = "C6130 (Data handling techniques); C7890 (Other special applications of computing)", 8027 classification = "723", 8028 corpsource = "Israeli Min. Defense, Tel-Aviv, Israel", 8029 journalabr = "Commun ACM", 8030 keywords = "automatic scanning; cartography; computer graphics; contour maps; data handling; digitizing; image processing; topology", 8031 treatment = "P Practical", 8032} 8033 8034@Article{Richman:1972:AEA, 8035 author = "Paul L. Richman", 8036 title = "Automatic Error Analysis for Determining Precision", 8037 journal = j-CACM, 8038 volume = "15", 8039 number = "9", 8040 pages = "813--817", 8041 month = sep, 8042 year = "1972", 8043 CODEN = "CACMA2", 8044 ISSN = "0001-0782", 8045 MRclass = "65G05", 8046 MRnumber = "47 2808", 8047 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8048 bibsource = "Compendex database", 8049 abstract = "The problem considered is that of evaluating a rational expression to within any desired tolerance on a computer which performs variable-precision floating-point arithmetic operations. An automatic error analysis technique is given for determining, directly from the results of a trial low-precision interval arithmetic calculation, just how much precision and data accuracy are required to achieve a desired final accuracy. The technique given generalize easily to the evaluation of many nonrational expressions.", 8050 acknowledgement = ack-nhfb, 8051 classcodes = "B0290B (Error analysis in numerical methods); C4110 (Error analysis in numerical methods); C5230 (Digital arithmetic methods)", 8052 classification = "921", 8053 corpsource = "Bell Telephone Labs. Inc., Denver, CO, USA", 8054 journalabr = "Commun ACM", 8055 keywords = "automatic error analysis; control; digital arithmetic; error analysis; floating point arithmetic; interval arithmetic; mathematical techniques; precision; precision control", 8056 treatment = "T Theoretical or Mathematical", 8057} 8058 8059@Article{Ravindran:1972:AAC, 8060 author = "A. Ravindran", 8061 title = "{ACM} Algorithm 431: {A} Computer Routine for Quadratic and Linear Programming Problems", 8062 journal = j-CACM, 8063 volume = "15", 8064 number = "9", 8065 pages = "818--820", 8066 month = sep, 8067 year = "1972", 8068 CODEN = "CACMA2", 8069 ISSN = "0001-0782", 8070 bibdate = "Mon Feb 12 14:34:00 1996", 8071} 8072 8073@Article{Bartels:1972:AAS, 8074 author = "R. H. Bartels and G. W. Stewart", 8075 title = "{ACM} Algorithm 432: Solution of the Matrix Equation ${\bf{A}}x+x{\bf{B}}={\bf{C}}$", 8076 journal = j-CACM, 8077 volume = "15", 8078 number = "9", 8079 pages = "820--826", 8080 month = sep, 8081 year = "1972", 8082 CODEN = "CACMA2", 8083 ISSN = "0001-0782", 8084 bibdate = "Thu Sep 08 09:33:59 1994", 8085 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.lin.alg.bib", 8086 keywords = "linear algebra; linear equations; matrices", 8087} 8088 8089@Article{Deutsch:1972:TAR, 8090 author = "E. S. Deutsch", 8091 title = "Thinning Algorithms on Rectangular, Hexagonal, and Triangular Arrays", 8092 journal = j-CACM, 8093 volume = "15", 8094 number = "9", 8095 pages = "827--837", 8096 month = sep, 8097 year = "1972", 8098 CODEN = "CACMA2", 8099 ISSN = "0001-0782", 8100 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8101 bibsource = "Compendex database", 8102 abstract = "Three thinning algorithms are developed: one each for use with rectangular, hexagonal, and triangular arrays. The approach to the development of each algorithm is the same. Pictorial results produced by each of the algorithms are presented and the relative performances of the algorithms are compared. It is found that the algorithm operating with the triangular array is the most sensitive to image irregularities and noise, yet it will yield a thinned image with an overall reduced number of points. It is concluded that the algorithm operating in conjunction with the hexagonal array has features which strike a balance between those of the other two arrays.", 8103 acknowledgement = ack-nhfb, 8104 classcodes = "C4290 (Other computer theory)", 8105 classification = "723", 8106 corpsource = "Univ. Maryland, College Park, MD, USA", 8107 journalabr = "Commun ACM", 8108 keywords = "arrays; computation theory; computer programming --- Subroutines; data handling; image processing; pattern recognition systems; rectangular, hexagonal, triangular; skeleton; thinning algorithms", 8109 treatment = "T Theoretical or Mathematical", 8110} 8111 8112@Article{Gregory:1972:CFP, 8113 author = "J. Gregory", 8114 title = "A Comparison of Floating Point Summation Methods", 8115 journal = j-CACM, 8116 volume = "15", 8117 number = "9", 8118 pages = "838--838", 8119 month = sep, 8120 year = "1972", 8121 CODEN = "CACMA2", 8122 ISSN = "0001-0782", 8123 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8124 bibsource = "garbo.uwasa.fi:/pc/doc-soft/fpbiblio.txt and ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib", 8125 acknowledgement = ack-nj # " and " # ack-nhfb, 8126 classcodes = "C5230 (Digital arithmetic methods)", 8127 corpsource = "Argonne Nat. Lab., IL, USA", 8128 descriptors = "Simulation; statistics; numeric calculation;", 8129 keywords = "comparison; digital arithmetic; error; error propagation; floating point summation methods; truncation", 8130 treatment = "T Theoretical or Mathematical", 8131} 8132 8133@Article{Khalil:1972:EBT, 8134 author = "Hatem M. Khalil", 8135 title = "The eigenproblem of block tridiagonal matrices", 8136 journal = j-CACM, 8137 volume = "15", 8138 number = "9", 8139 pages = "839--839", 8140 month = sep, 8141 year = "1972", 8142 CODEN = "CACMA2", 8143 ISSN = "0001-0782", 8144 MRclass = "839.65F15", 8145 MRnumber = "47 2802", 8146 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8147 acknowledgement = ack-nhfb, 8148 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 8149 corpsource = "Univ. Delaware, Newark, DE, USA", 8150 keywords = "block tridiagonal matrices; eigenvalues; eigenvalues and eigenfunctions; eigenvalues and eigenvectors; eigenvectors; linear algebra; matrix algebra; partial differential equations", 8151 treatment = "T Theoretical or Mathematical", 8152} 8153 8154@Article{Parnas:1972:CDP, 8155 author = "D. L. Parnas and A. N. Habermann and R. C. Holt", 8156 title = "Comment on Deadlock Prevention Method", 8157 journal = j-CACM, 8158 volume = "15", 8159 number = "9", 8160 pages = "840--841", 8161 month = sep, 8162 year = "1972", 8163 CODEN = "CACMA2", 8164 ISSN = "0001-0782", 8165 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8166 acknowledgement = ack-nhfb, 8167 classcodes = "C6150J (Operating systems)", 8168 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 8169 keywords = "deadlock; deadlock prevention method; deadly embrace; interlock; knotting; lockout; multiprogramming; resource allocation; scheduling; time sharing; time-sharing; time-sharing systems", 8170 treatment = "G General Review; T Theoretical or Mathematical", 8171} 8172 8173@Article{Rubinstein:1972:CBT, 8174 author = "R. Rubinstein and J. Feldman", 8175 title = "A controller for a {Braille} terminal", 8176 journal = j-CACM, 8177 volume = "15", 8178 number = "9", 8179 pages = "841--842", 8180 month = sep, 8181 year = "1972", 8182 CODEN = "CACMA2", 8183 ISSN = "0001-0782", 8184 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8185 acknowledgement = ack-nhfb, 8186 classcodes = "C5540 (Terminals and graphic displays); C5610 (Computer interfaces)", 8187 corpsource = "Univ. California, Irvine, CA, USA", 8188 keywords = "blind programming aid; braille; computer interfaces; computer peripheral equipment; computer terminal; controller; tactile terminal; terminal", 8189 treatment = "P Practical", 8190} 8191 8192@Article{Tan:1972:FIS, 8193 author = "K. C. Tan", 8194 title = "On {Foster}'s Information Storage and Retrieval Using {AVL} Trees", 8195 journal = j-CACM, 8196 volume = "15", 8197 number = "9", 8198 pages = "843--843", 8199 month = sep, 8200 year = "1972", 8201 CODEN = "CACMA2", 8202 ISSN = "0001-0782", 8203 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8204 note = "See \cite{Foster:1972:VCA}.", 8205 acknowledgement = ack-nhfb, 8206 classcodes = "C6120 (File organisation)", 8207 corpsource = "Northwestern Univ., Evanston, IL, USA", 8208 keywords = "(mathematical); AVL trees; binary trees; file organisation; information retrieval; information storage; search trees; trees", 8209 treatment = "T Theoretical or Mathematical", 8210 xxnote = "Check cross-reference??", 8211} 8212 8213@Article{Dijkstra:1972:HP, 8214 author = "E. W. Dijkstra", 8215 title = "The Humble Programmer", 8216 journal = j-CACM, 8217 volume = "15", 8218 number = "10", 8219 pages = "859--866", 8220 month = oct, 8221 year = "1972", 8222 CODEN = "CACMA2", 8223 ISSN = "0001-0782", 8224 bibdate = "Sat Jan 18 14:08:21 1997", 8225 note = "1972 ACM Turing Award Lecture.", 8226 abstract = "We shall do a much better programming job, provided that we approach the task with a full appreciation if its tremendous difficulty, provided that we stick to modest and elegant programming languages, provided that we respect the intrinsic limitations of the human mind and approach the task as Very Humble Programmers.", 8227} 8228 8229@Article{Morris:1972:DPT, 8230 author = "James B. Morris", 8231 title = "Demand Paging Through Utilization of Working Sets on the {Maniac II}", 8232 journal = j-CACM, 8233 volume = "15", 8234 number = "10", 8235 pages = "867--872", 8236 month = oct, 8237 year = "1972", 8238 CODEN = "CACMA2", 8239 ISSN = "0001-0782", 8240 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8241 bibsource = "Compendex database", 8242 abstract = "A hardware implementation on the Maniac II computer of the working set model for demand paging, as introduced by Denning, is discussed. characteristics of the Maniac II are given, along with a description of the basic demand paging scheme and the associative memory which has been added to the Maniac II hardware. A description of the hardware design for implementation of the working set model is discussed and a specification of the actions taken under various conditions which may arise during the operation of the full working set model, demand paging system is given.", 8243 acknowledgement = ack-nhfb, 8244 classcodes = "C5220 (Computer architecture); C6120 (File organisation)", 8245 classification = "723", 8246 corpsource = "Univ. California, Los Alamos, NM, USA", 8247 journalabr = "Commun ACM", 8248 keywords = "associative memory; associative storage; computer architecture; computer operating systems; data storage, digital; demand paging; dynamic storage allocation; file; hardware implementation; MANIAC II; model; organisation; storage allocation; storage management; utilization of working sets; virtual memory; working set", 8249 treatment = "T Theoretical or Mathematical", 8250} 8251 8252@Article{Ahrens:1972:CMS, 8253 author = "J. H. Ahrens and U. Dieter", 8254 title = "Computer Methods for Sampling from the Exponential and Normal Distributions", 8255 journal = j-CACM, 8256 volume = "15", 8257 number = "10", 8258 pages = "873--882", 8259 month = oct, 8260 year = "1972", 8261 CODEN = "CACMA2", 8262 ISSN = "0001-0782", 8263 MRclass = "65C10", 8264 MRnumber = "49 1728", 8265 mrreviewer = "V. Dupac", 8266 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8267 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib", 8268 abstract = "Various methods are known for transforming uniformly distributed random numbers into exponentially and normally distributed quantities. The most efficient ones are compared, in terms of memory requirements and speed, with some new algorithms. A number of procedures convert Taylor series expansions directly into sampling steps, an approach which may be used for sampling from any continuous distribution. For the exponential distribution a definite recommendation can be made, whereas in the case of the normal distribution there remains a choice between slower and shorter algorithms and faster but space consuming methods.", 8269 acknowledgement = ack-nhfb, 8270 classcodes = "C7890 (Other special applications of computing)", 8271 classification = "913; 922", 8272 corpsource = "Nova Scotia Tech. Coll., Halifax, NS, Canada", 8273 country = "USA", 8274 descriptors = "RVG;", 8275 enum = "6926", 8276 journalabr = "Commun ACM", 8277 keywords = "computer aided sampling; computer methods; distributed random numbers; distributions; exponential; normal distributions; random number generation; sampled data systems; sampling; sampling steps; uniformly", 8278 language = "English", 8279 references = "0", 8280 treatment = "T Theoretical or Mathematical", 8281} 8282 8283@Article{Hanson:1972:IEI, 8284 author = "Richard J. Hanson", 8285 title = "Integral Equations of Immunology", 8286 journal = j-CACM, 8287 volume = "15", 8288 number = "10", 8289 pages = "883--890", 8290 month = oct, 8291 year = "1972", 8292 CODEN = "CACMA2", 8293 ISSN = "0001-0782", 8294 MRclass = "65R05", 8295 MRnumber = "48 10166", 8296 mrreviewer = "S. Malon", 8297 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8298 bibsource = "Compendex database", 8299 abstract = "The inversion of a particular integral equation of the first (Fredholm) kind is the basic problem considered. The strategy which yielded success consisted of three essential points: (1) fit the known experimental data by a curve with properties which derive from properties of the (as yet unknown) function; (2) stabilize the computation for the unknown function by using singular value decomposition; (3) constrain the unknown function approximation (since it represents a probability distribution) to be nonnegative. \par A number of test cases are presented. One set of actual experimental data is analyzed with the procedures presented.", 8300 acknowledgement = ack-nhfb, 8301 classcodes = "B0290R (Integral equations); C4180 (Integral equations)", 8302 classification = "461; 921", 8303 corpsource = "California Inst. Technol., Pasadena, CA, USA", 8304 journalabr = "Commun ACM", 8305 keywords = "biomedical engineering; curve fitting; decomposition; experimental data; first kind; immunology; integral equation of; integral equations; integral equations of the first kind; inversion; mathematical techniques; medicine; nonnegative constraints; numerical methods; singular value; singular value analysis", 8306 treatment = "T Theoretical or Mathematical", 8307} 8308 8309@Article{Simmons:1972:GED, 8310 author = "Robert F. Simmons and Jonathan Slocum", 8311 title = "Generating {English} Discourse from Semantic Networks", 8312 journal = j-CACM, 8313 volume = "15", 8314 number = "10", 8315 pages = "891--905", 8316 month = oct, 8317 year = "1972", 8318 CODEN = "CACMA2", 8319 ISSN = "0001-0782", 8320 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8321 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/lisp.bib", 8322 abstract = "A system is described for generating English sentences from a form of semantic nets in which the nodes are word-sense meanings and the paths are primarily deep case relations. The grammar used by the system is in the form of a network that imposes an ordering on a set of syntactic transformations that are expressed as LISP functions. The generation algorithm uses the information in the semantic network to select appropriate generation paths through the grammar. The system is designed for use as a computational tool that allows a linguist to develop and study methods for generating surface strings from an underlying semantic structure. Initial findings with regard to form determiners such as voice, form, tense, and mood, some rules for embedding sentences, and some attention to pronominal substitution are reported. The system is programmed in LISP 1.5 and is available from the authors.", 8323 acknowledgement = ack-nhfb, 8324 classcodes = "C7820 (Humanities computing)", 8325 classification = "721; 723; 901", 8326 corpsource = "Univ. Texas, Austin, TX, USA", 8327 journalabr = "Commun ACM", 8328 keywords = "automata theory; computer applications; computer programming languages --- lisp; data processing --- Humanities Applications; deep case relations; English sentence generation; information science --- Language Translation and Linguistics; language translation and linguistics; LISP functions; semantic generation; semantic networks", 8329 treatment = "P Practical", 8330} 8331 8332@Article{Dathe:1972:CDT, 8333 author = "Gert Dathe", 8334 title = "Conversion of Decision Tables by Rule Mask Method without Rule Mask", 8335 journal = j-CACM, 8336 volume = "15", 8337 number = "10", 8338 pages = "906--909", 8339 month = oct, 8340 year = "1972", 8341 CODEN = "CACMA2", 8342 ISSN = "0001-0782", 8343 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8344 bibsource = "Compendex database", 8345 abstract = "Two algorithms for generating computer programs from decision tables are described. The algorithms allow handling limited entry, extended entry, and mixed entry tables. The algorithms are based on the rule mask method but need not have the masks at execution time. They perform the logical operations immediately rather than at the end of the interpreting process. Execution time can be considerably reduced by instantly marking rules which are not applicable or conditions which are already tested. The new algorithms combine to a certain degree the advantages of mask methods with those of tree methods.", 8346 acknowledgement = ack-nhfb, 8347 classcodes = "C6110 (Systems analysis and programming); C6150C (Compilers, interpreters and other processors)", 8348 classification = "723", 8349 corpsource = "Software AG, Darmstadt, West Germany", 8350 journalabr = "Commun ACM", 8351 keywords = "computer programming; conversion; decision tables; mask; program generation; program processors; rule mask method without rule", 8352 treatment = "T Theoretical or Mathematical", 8353} 8354 8355@Article{Frazer:1972:SNS, 8356 author = "W. D. Frazer and C. K. Wong", 8357 title = "Sorting by Natural Selection", 8358 journal = j-CACM, 8359 volume = "15", 8360 number = "10", 8361 pages = "910--913", 8362 month = oct, 8363 year = "1972", 8364 CODEN = "CACMA2", 8365 ISSN = "0001-0782", 8366 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8367 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 8368 abstract = "A family of sorting algorithms is proposed, the members of which make fuller use of the memory space and thus yield longer sorted strings. Extensive simulation results are presented, and various implications and further applications are discussed.", 8369 acknowledgement = ack-nhfb, 8370 classcodes = "C6130 (Data handling techniques)", 8371 classification = "723", 8372 corpsource = "IBM Thomas J.Watson Res. Center, Yorktown Heights, NY, USA", 8373 journalabr = "Commun ACM", 8374 keywords = "CACM; computer programming --- Subroutines; computer systems programming; natural selection; sorting", 8375 treatment = "T Theoretical or Mathematical", 8376} 8377 8378@Article{Ershov:1972:CAH, 8379 author = "A. P. Ershov", 8380 title = "Corrigendum: {``Aesthetics and the Human Factor in Programming''}", 8381 journal = j-CACM, 8382 volume = "15", 8383 number = "10", 8384 pages = "913--913", 8385 month = oct, 8386 year = "1972", 8387 CODEN = "CACMA2", 8388 ISSN = "0001-0782", 8389 bibdate = "Sat Jan 18 14:08:57 1997", 8390 note = "See \cite{Ershov:1972:AHF}.", 8391} 8392 8393@Article{Akima:1972:AAI, 8394 author = "H. Akima", 8395 title = "{ACM} Algorithm 433: Interpolation and Smooth Curve Fitting Based on Local Procedures", 8396 journal = j-CACM, 8397 volume = "15", 8398 number = "10", 8399 pages = "914--918", 8400 month = oct, 8401 year = "1972", 8402 CODEN = "CACMA2", 8403 ISSN = "0001-0782", 8404 bibdate = "Thu Sep 08 09:47:55 1994", 8405 note = "See also \cite{Anderson:1976:RIS}.", 8406} 8407 8408@Article{Fox:1972:CSC, 8409 author = "Phyllis Fox", 8410 title = "Comparative Study of Computer Programs for Integrating Differential Equations", 8411 journal = j-CACM, 8412 volume = "15", 8413 number = "11", 8414 pages = "941--948", 8415 month = nov, 8416 year = "1972", 8417 CODEN = "CACMA2", 8418 ISSN = "0001-0782", 8419 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8420 bibsource = "Compendex database", 8421 abstract = "The integration methods represented include multistep methods (predictor-correctors), single-step methods (Runge-Kutta) and extrapolation methods (both polynomial and rational). The testing procedure is described together with the evaluation criteria applied. A set of test problems on which the programs were tested is included in appendix. For the particular problems and criteria used in the investigation it was found that a program based on rational extrapolation showed the best performance.", 8422 acknowledgement = ack-nhfb, 8423 classcodes = "B0290P (Differential equations); C4170 (Differential equations)", 8424 classification = "723; 921", 8425 corpsource = "Newark Coll. Engng., NJ, USA", 8426 journalabr = "Commun ACM", 8427 keywords = "comparative study; computer programming; computer programs; differential; differential equations; equations; extrapolation methods; integration methods; mathematical techniques --- Differential Equations; mathematical techniques --- Integration; predictor-corrector methods", 8428 treatment = "T Theoretical or Mathematical", 8429} 8430 8431@Article{Malcolm:1972:ARP, 8432 author = "Michael A. Malcolm", 8433 title = "Algorithms to Reveal Properties of Floating-Point Arithmetic", 8434 journal = j-CACM, 8435 volume = "15", 8436 number = "11", 8437 pages = "949--951", 8438 month = nov, 8439 year = "1972", 8440 CODEN = "CACMA2", 8441 ISSN = "0001-0782", 8442 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8443 bibsource = "Compendex database", 8444 note = "See also \cite{Gentleman:1974:MAR}.", 8445 abstract = "Two algorithms are presented in the form of Fortran subroutines. Each subroutine computes the radix and number of digits of the floating-point numbers and whether rounding or chopping is done by the machine on which it is run. The methods are shown to work on any ``reasonable'' floating-point computer.", 8446 acknowledgement = ack-nhfb, 8447 classcodes = "C5230 (Digital arithmetic methods)", 8448 classification = "723", 8449 corpsource = "Stanford Univ., CA, USA", 8450 journalabr = "Commun ACM", 8451 keywords = "chopping; computer programming; computer programming languages --- Fortran; digital arithmetic; digits; floating point arithmetic; Fortran subroutines; mathematical techniques --- Digital Arithmetic; number of; properties; radix; rounding", 8452 treatment = "T Theoretical or Mathematical", 8453} 8454 8455@Article{Patrick:1972:HPA, 8456 author = "Merrell L. Patrick", 8457 title = "A Highly Parallel Algorithm for Approximating All Zeros of a Polynomial with Only Real Zeros", 8458 journal = j-CACM, 8459 volume = "15", 8460 number = "11", 8461 pages = "952--955", 8462 month = nov, 8463 year = "1972", 8464 CODEN = "CACMA2", 8465 ISSN = "0001-0782", 8466 MRclass = "65H05", 8467 MRnumber = "48 1455", 8468 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8469 bibsource = "Compendex database", 8470 abstract = "An algorithm is described based on Newton's method which simultaneously approximates all zeros of a polynomial with only real zeros. The algorithm, which is conceptually suitable for parallel computation, determines its own starting values so that convergence to the zeros is guaranteed. Multiple zeros and their multiplicity are readily determined. At no point in the method is polynomial deflation used.", 8471 acknowledgement = ack-nhfb, 8472 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation)", 8473 classification = "723; 921", 8474 corpsource = "Duke Univ., Durham, NC, USA", 8475 journalabr = "Commun ACM", 8476 keywords = "approximation with real zeros; computer programming; function approximation; guaranteed convergence; highly; mathematical techniques --- Poles and Zeros; mathematical techniques --- Polynomials; multiple zeros; Newton's method; parallel algorithm; parallel numerical algorithms; poles and zeros; polynomial zeros; polynomials; real polynomials; real zeros; starting values", 8477 treatment = "T Theoretical or Mathematical", 8478} 8479 8480@Article{Ledgard:1972:MTC, 8481 author = "Henry F. Ledgard", 8482 title = "Model for Type Checking --- with an Application to {Algol 60}", 8483 journal = j-CACM, 8484 volume = "15", 8485 number = "11", 8486 pages = "956--966", 8487 month = nov, 8488 year = "1972", 8489 CODEN = "CACMA2", 8490 ISSN = "0001-0782", 8491 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8492 bibsource = "Compendex database", 8493 abstract = "This paper attempts to isolate the notion of type checking and presents a partial solution to the type checking problem based on the notions of abstraction and application of functions. A program is mapped into an expression within a decidable subset of the lambda-calculus, which characterizes the type relations within the program and eliminates all other information. The determination of the type-wise correctness or incorrectness of the program is resolved by reducing its corresponding lambda-calculus expression to one of two normal forms, the constant ``correct'' for a type-wise correct program or the constant ``error.'' An application to type checking in Algol 60 is made, and the attendant problems faced for any notion of type checking are discussed.", 8494 acknowledgement = ack-nhfb, 8495 classcodes = "C6150C (Compilers, interpreters and other processors)", 8496 classification = "723", 8497 corpsource = "Johns Hopkins Univ., Baltimore, MD, USA", 8498 journalabr = "Commun ACM", 8499 keywords = "abstraction; ALGOL; ALGOL 60; application of functions; compilation; computer programming languages; execution; lambda calculus; model; program compilers; type checking", 8500 treatment = "T Theoretical or Mathematical", 8501} 8502 8503@Article{Henderson:1972:DSS, 8504 author = "Peter Henderson", 8505 title = "Derived Semantics for Some Programming Language Constructs", 8506 journal = j-CACM, 8507 volume = "15", 8508 number = "11", 8509 pages = "967--973", 8510 month = nov, 8511 year = "1972", 8512 CODEN = "CACMA2", 8513 ISSN = "0001-0782", 8514 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8515 bibsource = "Compendex database", 8516 abstract = "The constructs of a simple programming language are introduced and described informally in terms of values and side-effects. a translator is defined which translates the language into flowcharts for a simple machine. The action of the machine in executing a flowchart is defined. A proof is constructed that the effect of translating and executing any program can be expressed solely in terms of the value and side-effect of the program. during the course of constructing the proof, formal definitions of the concepts of value and side-effect are derived in order to make the proof rigorous. Correctness of the implementation involves checking that the definitions derived in the step above are an acceptable formalization of the informal description given in the first step.", 8517 acknowledgement = ack-nhfb, 8518 classcodes = "C4240 (Programming and algorithm theory)", 8519 classification = "723", 8520 corpsource = "Univ. Newcastle upon Tyne, UK", 8521 journalabr = "Commun ACM", 8522 keywords = "computer programming languages; constructs; derived semantics; flowcharts; lambda calculus; programming language; programming theory; side effects; translator; values", 8523 treatment = "T Theoretical or Mathematical", 8524} 8525 8526@Article{Verhelst:1972:CLD, 8527 author = "M. Verhelst", 8528 title = "Conversion of Limited-Entry Decision Tables to Optimal and Near-Optimal Flowcharts: Two New Algorithms", 8529 journal = j-CACM, 8530 volume = "15", 8531 number = "11", 8532 pages = "974--980", 8533 month = nov, 8534 year = "1972", 8535 CODEN = "CACMA2", 8536 ISSN = "0001-0782", 8537 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8538 bibsource = "Compendex database", 8539 abstract = "The algorithms are first derived for treating decision tables not containing an ELSE-rule, but the optimum-approaching algorithm is shown to be equally valid for tables including such a rule. Both algorithms are compared with existing ones and are applied to a somewhat large decision table derived from a real case.", 8540 acknowledgement = ack-nhfb, 8541 classcodes = "C6110 (Systems analysis and programming)", 8542 classification = "723", 8543 corpsource = "Univ. Louvain, Belgium", 8544 journalabr = "Commun ACM", 8545 keywords = "algorithm; computer programming --- Subroutines; computer programming languages; conversion; decision tables; flowcharting; limited entry decision tables; minimum execution time; near; optimal flowcharts; optimisation; optimum approaching algorithm; optimum finding", 8546 treatment = "T Theoretical or Mathematical", 8547} 8548 8549@Article{Baecker:1972:GCV, 8550 author = "H. D. Baecker", 8551 title = "Garbage Collection for Virtual Memory Computer Systems", 8552 journal = j-CACM, 8553 volume = "15", 8554 number = "11", 8555 pages = "981--986", 8556 month = nov, 8557 year = "1972", 8558 CODEN = "CACMA2", 8559 ISSN = "0001-0782", 8560 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8561 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 8562 abstract = "In list processing there is typically a growing demand for space during program execution. This paper examines the practical implications of this growth within a virtual memory computer system, proposes two new garbage collection techniques for virtual memory systems, and compares them with traditional methods by discussion and by simulation.", 8563 acknowledgement = ack-nhfb, 8564 classcodes = "C6120 (File organisation)", 8565 classification = "723", 8566 corpsource = "Univ. Calgary, Alta., Canada", 8567 journalabr = "Commun ACM", 8568 keywords = "computer operating systems --- Storage Allocation; computer programming languages; data storage, digital; file organisation; garbage collection; list; paging; processing; segmentation; storage allocation; storage management; virtual memory; virtual memory computer systems", 8569 treatment = "P Practical", 8570} 8571 8572@Article{Ramberg:1972:AMG, 8573 author = "John S. Ramberg and Bruce W. Schmeiser", 8574 title = "Approximate Method for Generating Symmetric Random Variables", 8575 journal = j-CACM, 8576 volume = "15", 8577 number = "11", 8578 pages = "987--990", 8579 month = nov, 8580 year = "1972", 8581 CODEN = "CACMA2", 8582 ISSN = "0001-0782", 8583 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8584 bibsource = "Compendex database", 8585 abstract = "A method for generating values of continuous symmetric random variables that is relatively fast, requires essentially no computer memory, and is easy to use is developed. The method, which uses a uniform zero-one random number source, is based on the inverse function of the lambda distribution of Tukey. Since it approximates many of the continuous theoretical distributions and empirical distributions frequently used in simulations, the method should be useful to simulation practitioners.", 8586 acknowledgement = ack-nhfb, 8587 classcodes = "C7890 (Other special applications of computing)", 8588 classification = "922", 8589 corpsource = "Univ. Iowa, Iowa City, IA, USA", 8590 journalabr = "Commun ACM", 8591 keywords = "approximate method; inverse function; lambda distribution of Tukey; mathematical models; mathematical statistics; random number generation; random number source; simulation; symmetric random variable generation; uniform zero one", 8592 treatment = "T Theoretical or Mathematical", 8593} 8594 8595@Article{March:1972:AAE, 8596 author = "D. L. March", 8597 title = "{ACM} Algorithm 434: Exact Probabilities for ${R\times{C}}$ Contingency Tables", 8598 journal = j-CACM, 8599 volume = "15", 8600 number = "11", 8601 pages = "991--992", 8602 month = nov, 8603 year = "1972", 8604 CODEN = "CACMA2", 8605 ISSN = "0001-0782", 8606 bibdate = "Tue Sep 20 19:26:04 1994", 8607 note = "See also \cite{Boulton:1976:REP}.", 8608} 8609 8610@Article{Fullerton:1972:AAM, 8611 author = "W. Fullerton", 8612 title = "{ACM} Algorithm 435: Modified Incomplete Gamma Function", 8613 journal = j-CACM, 8614 volume = "15", 8615 number = "11", 8616 pages = "993--995", 8617 month = nov, 8618 year = "1972", 8619 CODEN = "CACMA2", 8620 ISSN = "0001-0782", 8621 bibdate = "Thu Sep 08 09:47:55 1994", 8622 note = "See also \cite{Schoene:1978:RMI}.", 8623} 8624 8625@Article{Lum:1972:ARK, 8626 author = "V. Y. Lum and P. S. T. Yuen", 8627 title = "Additional results on key-to-address transform techniques: a fundamental performance study on large existing formatted files", 8628 journal = j-CACM, 8629 volume = "15", 8630 number = "11", 8631 pages = "996--997", 8632 month = nov, 8633 year = "1972", 8634 CODEN = "CACMA2", 8635 ISSN = "0001-0782", 8636 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8637 acknowledgement = ack-nhfb, 8638 classcodes = "C6120 (File organisation)", 8639 corpsource = "IBM Res. Lab., San Jose, CA, USA", 8640 keywords = "file; file organisation; fundamental performance; hash coding; key to address transform techniques; large existing formatted files; organization; study", 8641 treatment = "P Practical", 8642} 8643 8644@Article{Kennedy:1972:NOD, 8645 author = "S. Kennedy", 8646 title = "A note on optimal doubly-chained trees", 8647 journal = j-CACM, 8648 volume = "15", 8649 number = "11", 8650 pages = "997--998", 8651 month = nov, 8652 year = "1972", 8653 CODEN = "CACMA2", 8654 ISSN = "0001-0782", 8655 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8656 acknowledgement = ack-nhfb, 8657 classcodes = "C6120 (File organisation)", 8658 corpsource = "California Inst. Technol., Pasadena, CA, USA", 8659 keywords = "binary search; file organisation; file searching; optimal doubly chained trees; tree; trees (mathematical)", 8660 treatment = "T Theoretical or Mathematical", 8661} 8662 8663@Article{Eisenberg:1972:FCD, 8664 author = "Murray A. Eisenberg and Michael R. McGuire", 8665 title = "Further comments on {Dijkstra}'s concurrent programming control problem", 8666 journal = j-CACM, 8667 volume = "15", 8668 number = "11", 8669 pages = "999--999", 8670 month = nov, 8671 year = "1972", 8672 CODEN = "CACMA2", 8673 ISSN = "0001-0782", 8674 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8675 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 8676 acknowledgement = ack-nhfb, 8677 classcodes = "C6150J (Operating systems)", 8678 keywords = "critical; Dijkstra's concurrent programming control problem; multiprocessing; multiprocessing programs; section", 8679 treatment = "T Theoretical or Mathematical", 8680 xxtitle = "Further Comments on {Dijkstra}'s Concurrent Programming Control Problems", 8681} 8682 8683@Article{Smoliar:1972:CMM, 8684 author = "S. W. Smoliar", 8685 title = "Comments on {Moorer's Music} and computer composition", 8686 journal = j-CACM, 8687 volume = "15", 8688 number = "11", 8689 pages = "1000--1001", 8690 month = nov, 8691 year = "1972", 8692 CODEN = "CACMA2", 8693 ISSN = "0001-0782", 8694 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8695 acknowledgement = ack-nhfb, 8696 classcodes = "C7820 (Humanities computing)", 8697 corpsource = "Tech. Israel Inst. Technol., Haifa, Israel", 8698 keywords = "artificial intelligence; computer composition; computer music; heuristic; humanities; programming", 8699 treatment = "P Practical", 8700} 8701 8702@Article{Phillips:1972:DPA, 8703 author = "J. Richard Phillips and H. C. Adams", 8704 title = "Dynamic Partitioning for Array Languages", 8705 journal = j-CACM, 8706 volume = "15", 8707 number = "12", 8708 pages = "1023--1032", 8709 month = dec, 8710 year = "1972", 8711 CODEN = "CACMA2", 8712 ISSN = "0001-0782", 8713 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8714 bibsource = "Compendex database", 8715 abstract = "The classical process of partitioning an array into subarrays is extended to a more useful array language operation. Various modes of partitioning are defined for different types of arrays, so that subarrays may vary over the original array in a nearly arbitrary manner. These definitions are motivated with several realistic examples to illustrate the value of partitioning for array languages. Of general interest is the data structure for partitioning. This consists of dynamic tree structures which are used to derive and maintain the array control information. These are described in sufficient detail to be of value in the design of other array languages. The description presented in this paper is implemented in a new array language, OL/2, currently under development at the University of Illinois.", 8716 acknowledgement = ack-nhfb, 8717 classcodes = "C6120 (File organisation); C6140D (High level languages)", 8718 classification = "723", 8719 corpsource = "Univ. Illinois, Urbana-Champaign, IL, USA", 8720 journalabr = "Commun ACM", 8721 keywords = "array languages; array partitioning; computer programming languages; data processing --- Data Structures; data structure; data structures; dynamic partitioning; dynamic tree structures; OL/2; programming languages", 8722 treatment = "T Theoretical or Mathematical", 8723} 8724 8725@Article{Bayer:1972:IRM, 8726 author = "R. Bayer and C. Witzgall", 8727 title = "Index Ranges for Matrix Calculi", 8728 journal = j-CACM, 8729 volume = "15", 8730 number = "12", 8731 pages = "1033--1039", 8732 month = dec, 8733 year = "1972", 8734 CODEN = "CACMA2", 8735 ISSN = "0001-0782", 8736 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8737 bibsource = "Compendex database", 8738 abstract = "The paper describes a scheme for symbolic manipulation of index expressions which arise as a by-product of the symbolic manipulation of expressions in the matrix calculi described by the authors in a previous paper. This scheme attempts program optimization by transforming the original algorithm rather than the machine code. The goal is to automatically generate code for handling the tedious address calculations necessitated by complicated data structures. The paper is therefore preoccupied with ``indexing by position.'' The relationship of ``indexing by name'' and ``indexing by position'' is discussed.", 8739 acknowledgement = ack-nhfb, 8740 classcodes = "C6130 (Data handling techniques)", 8741 classification = "723", 8742 corpsource = "Boeing Sci. Res. Labs., Seattle, WA, USA", 8743 journalabr = "Commun ACM", 8744 keywords = "address calculations; algorithm; computer programming languages; data handling; data processing; data structures; expressions; index; index ranges; indexing by name; indexing by position; matrix algebra; matrix calculi; program optimization; symbolic manipulation; transformation", 8745 treatment = "T Theoretical or Mathematical", 8746} 8747 8748@Article{Earley:1972:MIC, 8749 author = "Jay Earley and Paul Caizergues", 8750 title = "Method for Incrementally Compiling Languages with Nested Statement Structure", 8751 journal = j-CACM, 8752 volume = "15", 8753 number = "12", 8754 pages = "1040--1044", 8755 month = dec, 8756 year = "1972", 8757 CODEN = "CACMA2", 8758 ISSN = "0001-0782", 8759 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8760 bibsource = "Compendex database", 8761 abstract = "The method permits editing of the source language using a general purpose text editor, and incremental processing of changes without frequent recompilation of entire routines. The essential points of the method are: the syntax of the language is restricted insofar as which constructs may occur on lines; an internal data structure (called the skeleton) is maintained to represent the statement structure; the recompilation is partially batched in the sense that recompilation of modified lines does not occur until the last of a set of editing commands has been received; and the parsing and compilation are factored into two parts, that done on individual lines and that done globally to handle the relationships between the lines.", 8762 acknowledgement = ack-nhfb, 8763 classcodes = "C6150C (Compilers, interpreters and other processors)", 8764 classification = "723", 8765 corpsource = "Univ. California, Berkeley, CA, USA", 8766 journalabr = "Commun ACM", 8767 keywords = "ALGOL; computer operating systems --- Program Compilers; computer programming languages; data processing --- Data Structures; editor; general purpose text; incremental compilation; nested statement structure; PL/I; program compilers; programming languages; source language", 8768 treatment = "T Theoretical or Mathematical", 8769} 8770 8771@Article{Luccio:1972:WIL, 8772 author = "Fabrizio Luccio", 8773 title = "Weighted Increment Linear Search for Scatter Tables", 8774 journal = j-CACM, 8775 volume = "15", 8776 number = "12", 8777 pages = "1045--1047", 8778 month = dec, 8779 year = "1972", 8780 CODEN = "CACMA2", 8781 ISSN = "0001-0782", 8782 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8783 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 8784 abstract = "A new linear search for hash tables whose increment step is a function of the key being addressed is presented. Comparisons with known methods are given, in terms of efficiency and computation complexity. In particular, the new method applies to tables of size n equals 2**r. It allows full table searching, and practically eliminates primary clustering at a very low cost.", 8785 acknowledgement = ack-nhfb, 8786 classcodes = "C6130 (Data handling techniques)", 8787 classification = "723", 8788 corpsource = "Univ. Pisa, Italy", 8789 journalabr = "Commun ACM", 8790 keywords = "clustering; computer programming; hash; information retrieval systems; information searching techniques; scatter tables; table lookup; tables; weighted increment linear search", 8791 treatment = "T Theoretical or Mathematical", 8792} 8793 8794@Article{Barr:1972:CMN, 8795 author = "D. R. Barr and N. L. Slezak", 8796 title = "A comparison of multivariate normal generators", 8797 journal = j-CACM, 8798 volume = "15", 8799 number = "12", 8800 pages = "1048--1049", 8801 month = dec, 8802 year = "1972", 8803 CODEN = "CACMA2", 8804 ISSN = "0001-0782", 8805 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8806 acknowledgement = ack-nhfb, 8807 classcodes = "C7890 (Other special applications of computing)", 8808 corpsource = "Naval Postgraduate School, Monterey, CA, USA", 8809 keywords = "comparison; covariance matrix; Gaussian random number generator; multivariate; multivariate normal generators; normal random vectors; random number generation; simulation; triangular factorization", 8810 treatment = "T Theoretical or Mathematical", 8811} 8812 8813@Article{Moore:1972:NMS, 8814 author = "John Moore and Prentiss Robinson", 8815 title = "New Method for the Solution of the {Cauchy} Problem for Parabolic Equations", 8816 journal = j-CACM, 8817 volume = "15", 8818 number = "12", 8819 pages = "1050--1052", 8820 month = dec, 8821 year = "1972", 8822 CODEN = "CACMA2", 8823 ISSN = "0001-0782", 8824 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8825 bibsource = "Compendex database", 8826 abstract = "An integral equation representation is given for parabolic partial differential equations. When the equations are defined in unbounded domains, as in the initial value (Cauchy) problem, the solution of the integral equation by the method of successive approximation has inherent advantages over other methods. Error bounds for the method are of order h**3**/**2 and h**7**/**2 (h is the increment size) depending on the finite difference approximations involved.", 8827 acknowledgement = ack-nhfb, 8828 classcodes = "B0290P (Differential equations); C4170 (Differential equations)", 8829 classification = "921", 8830 corpsource = "Univ. Newcastle, UK", 8831 journalabr = "Commun ACM", 8832 keywords = "Cauchy problem; initial value problem; integral equation representation; mathematical techniques; parabolic; partial differential equations; successive approximation", 8833 treatment = "T Theoretical or Mathematical", 8834} 8835 8836@Article{Parnas:1972:CBU, 8837 author = "D. L. Parnas", 8838 title = "On the Criteria to Be Used in Decomposing Systems into Modules", 8839 journal = j-CACM, 8840 volume = "15", 8841 number = "12", 8842 pages = "1053--1058", 8843 month = dec, 8844 year = "1972", 8845 CODEN = "CACMA2", 8846 ISSN = "0001-0782", 8847 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8848 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/softeng.bib", 8849 abstract = "This paper discusses modularization as a mechanism for improving the flexibility and comprehensibility of a system while allowing the shortening of its development time. The effectiveness of a ``modularization'' is dependent upon the criteria used in dividing the system into modules. A system design problem presented and both a conventional and unconventional decomposition are described. It is shown that the unconventional decompositions have distinct advantages for the goals outlined. The criteria used in arriving at the decompositions are discussed. The unconventional decomposition, if implemented with the conventional assumption that a module consists of one or more subroutines, will be less efficient in most cases. An alternative approach to implementation which does not this effect is sketched.", 8850 acknowledgement = ack-nhfb, 8851 classcodes = "C6110 (Systems analysis and programming)", 8852 classification = "723", 8853 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 8854 journalabr = "Commun ACM", 8855 keywords = "comprehensibility; computer programming; criteria; decomposition; flexibility; modularization; modules; programming; software engineering; systems", 8856 treatment = "T Theoretical or Mathematical", 8857} 8858 8859@Article{Brown:1972:LLP, 8860 author = "P. J. Brown", 8861 title = "Levels of Language for Portable Software", 8862 journal = j-CACM, 8863 volume = "15", 8864 number = "12", 8865 pages = "1059--1062", 8866 month = dec, 8867 year = "1972", 8868 CODEN = "CACMA2", 8869 ISSN = "0001-0782", 8870 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8871 bibsource = "Compendex database", 8872 abstract = "An increasing amount of software is being implemented in a portable form. A popular way of accomplishing this is to encode the software in a specially designed machine-independent language and then to map this language, often using a macro processor, into the assembly language of each desired object machine. The design of the machine-independent language is the key factor in this operation. This paper discusses the relative merits of pitching this language at a high level or a low level, and presents some comparative results.", 8873 acknowledgement = ack-nhfb, 8874 classcodes = "C6140D (High level languages)", 8875 classification = "723", 8876 corpsource = "Univ. Kent, Canterbury, UK", 8877 journalabr = "Commun ACM", 8878 keywords = "assembly language; computer programming; levels of language; machine independent language; macro processor; portable software; procedure oriented languages", 8879 treatment = "T Theoretical or Mathematical", 8880} 8881 8882@Article{Sherman:1972:TMA, 8883 author = "Stephen Sherman and Forest {Baskett, III} and J. C. Browne", 8884 title = "Trace-Driven Modeling and Analysis of {CPU} Scheduling in a Multiprogramming System", 8885 journal = j-CACM, 8886 volume = "15", 8887 number = "12", 8888 pages = "1063--1069", 8889 month = dec, 8890 year = "1972", 8891 CODEN = "CACMA2", 8892 ISSN = "0001-0782", 8893 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8894 bibsource = "Compendex database", 8895 abstract = "The scheduling methods tested included the best possible and worst possible methods, the traditional methods of multiprogramming theory, round-robin, first-come-first-served, and dynamic predictors. The relative and absolute performances of these scheduling methods are given. It is concluded that a successful CPU scheduling method must be preemptive and must prevent a given job from holding the CPU for too long a period.", 8896 acknowledgement = ack-nhfb, 8897 classcodes = "C6150J (Operating systems)", 8898 classification = "723", 8899 corpsource = "Univ. Texas, Austin, TX, USA", 8900 journalabr = "Commun ACM", 8901 keywords = "analysis; computer systems programming; CPU scheduling; first come first served; microscopic level job stream data; modelling; multiprogramming; multiprogramming system; round robin; trace driven modelling", 8902 treatment = "T Theoretical or Mathematical", 8903} 8904 8905@Article{Boland:1972:AAPa, 8906 author = "W. R. Boland", 8907 title = "{ACM} Algorithm 436: Product Type Trapezoidal Integration", 8908 journal = j-CACM, 8909 volume = "15", 8910 number = "12", 8911 pages = "1070--1070", 8912 month = dec, 8913 year = "1972", 8914 CODEN = "CACMA2", 8915 ISSN = "0001-0782", 8916 bibdate = "Thu Sep 08 09:34:00 1994", 8917} 8918 8919@Article{Boland:1972:AAPb, 8920 author = "W. R. Boland", 8921 title = "{ACM} Algorithm 437: Product Type {Simpson}'s Integration", 8922 journal = j-CACM, 8923 volume = "15", 8924 number = "12", 8925 pages = "1070--1071", 8926 month = dec, 8927 year = "1972", 8928 CODEN = "CACMA2", 8929 ISSN = "0001-0782", 8930 bibdate = "Thu Sep 08 09:33:59 1994", 8931} 8932 8933@Article{Boland:1972:AAPc, 8934 author = "W. R. Boland", 8935 title = "{ACM} Algorithm 439: Product Type Three-point {Gauss-Legendre-Simpson}'s Integration", 8936 journal = j-CACM, 8937 volume = "15", 8938 number = "12", 8939 pages = "1072", 8940 month = dec, 8941 year = "1972", 8942 CODEN = "CACMA2", 8943 ISSN = "0001-0782", 8944 bibdate = "Thu Sep 08 09:34:00 1994", 8945} 8946 8947@Article{Denning:1973:CWM, 8948 author = "Peter J. Denning and Stuart C. Schwartz", 8949 title = "Corrigendum: ``{Properties of the working-set model}''", 8950 journal = j-CACM, 8951 volume = "15", 8952 number = "2", 8953 pages = "191--198", 8954 month = feb, 8955 year = "1973", 8956 CODEN = "CACMA2", 8957 ISSN = "0001-0782", 8958 bibdate = "Tue May 28 11:37:15 1996", 8959 note = "See \cite{Denning:1972:PWS}.", 8960} 8961 8962@Article{Shedler:1973:QMM, 8963 author = "G. S. Shedler", 8964 title = "A Queuing Model of a Multiprogrammed Computer with a Two-Level Storage System", 8965 journal = j-CACM, 8966 volume = "16", 8967 number = "1", 8968 pages = "3--10", 8969 month = jan, 8970 year = "1973", 8971 CODEN = "CACMA2", 8972 ISSN = "0001-0782", 8973 MRclass = "68A50", 8974 MRnumber = "51 14680", 8975 mrreviewer = "K. Vairaran", 8976 bibdate = "Tue Mar 25 13:26:09 MST 1997", 8977 bibsource = "Compendex database", 8978 abstract = "The results are presented of an analysis of a probabilistic model of a multiprogrammed computer system with a two-level storage system in which there is sequential dependency of accesses between the devices. Expressions are obtained for the long-run probability that both the CPU and each of the storage devices are busy. Some numerical results are given which quantify the gains in CPU utilization obtainable by multiprogramming in the presence of this type of storage system.", 8979 acknowledgement = ack-nhfb, 8980 classcodes = "C4290 (Other computer theory)", 8981 classification = "723; 922", 8982 corpsource = "IBM, San Jose, CA, USA", 8983 journalabr = "Commun ACM", 8984 keywords = "computer systems programming --- Multiprogramming; data storage, digital; dependency of accesses; hierarchical index ses; hierarchical index sets; modelling; multiprogrammed computer; multiprogrammed computer system; multiprogramming; probability; queueing theory; queuing model; sequential; storage system; two level", 8985 treatment = "T Theoretical or Mathematical", 8986} 8987 8988@Article{Bays:1973:RHC, 8989 author = "Carter Bays", 8990 title = "The Reallocation of Hash-Coded Tables", 8991 journal = j-CACM, 8992 volume = "16", 8993 number = "1", 8994 pages = "11--14", 8995 month = jan, 8996 year = "1973", 8997 CODEN = "CACMA2", 8998 ISSN = "0001-0782", 8999 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9000 bibsource = "Compendex database", 9001 abstract = "When the space allocation for a hash-coded table is altered, the table entries must be rescattered over the new space. A technique for accomplishing this rescattering is presented. The technique is independent of both the length of the table and the hashing function used, and can be utilized in conjunction with a linear reallocation of the table being rescattered. Moreover, it can be used to eliminate previously flagged deletions from any hash-coded table, or to change from one hashing method to another. The efficiency of the technique is discussed and theoretical statistics are given.", 9002 acknowledgement = ack-nhfb, 9003 annote = "Algorithm to handle increase or decrease within a direct access table containing entries.", 9004 classcodes = "C6110 (Systems analysis and programming); C6120 (File organisation)", 9005 classification = "723", 9006 corpsource = "Univ. South Carolina, Columbia, SC, USA", 9007 journalabr = "Commun ACM", 9008 keywords = "computer systems programming; data storage, digital; dynamic storage; hash code; reallocation; scatter storage", 9009 keywords = "deletions; dynamic storage; hash code; programming; reallocation; scatter storage; storage allocation", 9010 treatment = "P Practical", 9011} 9012 9013@Article{Morris:1973:PPL, 9014 author = "James H. {Morris, Jr.}", 9015 title = "Protection in Programming Languages", 9016 journal = j-CACM, 9017 volume = "16", 9018 number = "1", 9019 pages = "15--21", 9020 month = jan, 9021 year = "1973", 9022 CODEN = "CACMA2", 9023 ISSN = "0001-0782", 9024 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9025 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 9026 abstract = "Linguistic mechanisms which can be used to protect one subprogram from another's malfunctioning are described. Function-producing functions and various type-tagging schemes are considered. An attempt is made to distinguish between access limitation and authentication.", 9027 acknowledgement = ack-nhfb, 9028 classcodes = "C6100 (Software techniques and systems)", 9029 classification = "723", 9030 corpsource = "Univ. California, Berkeley, CA, USA", 9031 journalabr = "Commun ACM", 9032 keywords = "access control; access keys; authentication; computer programming languages; environments; programming languages; protection; seals; secrecy; security of data; trademarks; types", 9033 treatment = "G General Review; T Theoretical or Mathematical", 9034} 9035 9036@Article{Muraoka:1973:TRS, 9037 author = "Yoichi Muraoka and David J. Kuck", 9038 title = "On the Time Required for a Sequence of Matrix Products", 9039 journal = j-CACM, 9040 volume = "16", 9041 number = "1", 9042 pages = "22--26", 9043 month = jan, 9044 year = "1973", 9045 CODEN = "CACMA2", 9046 ISSN = "0001-0782", 9047 MRclass = "68A20", 9048 MRnumber = "51 2347", 9049 mrreviewer = "M. Tetruasvili", 9050 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9051 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 9052 abstract = "This paper discusses the multiplication of conformable sequences of row vectors, column vectors, and square matrices. The minimum time required to evaluate such products on ordinary serial computers as well as parallel computers is discussed. Algorithms are presented which properly parse such matrix sequences subject to the constraints of the machine organization.", 9053 acknowledgement = ack-nhfb, 9054 classcodes = "C5230 (Digital arithmetic methods)", 9055 classification = "723", 9056 corpsource = "Univ. Illinois, Urbana-Champaign, IL, USA", 9057 journalabr = "Commun ACM", 9058 keywords = "computer programming; computer programming languages; computers; digital arithmetic; matrix algebra; matrix expressions; matrix multiplication; operation minimization; parallel computers; parallel machine; parallel processing; sequence of matrix products; serial; time required", 9059 treatment = "T Theoretical or Mathematical", 9060} 9061 9062@Article{James:1973:ACP, 9063 author = "E. B. James and D. P. Partridge", 9064 title = "Adaptive Correction of Program Statements", 9065 journal = j-CACM, 9066 volume = "16", 9067 number = "1", 9068 pages = "27--37", 9069 month = jan, 9070 year = "1973", 9071 CODEN = "CACMA2", 9072 ISSN = "0001-0782", 9073 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9074 bibsource = "Compendex database", 9075 abstract = "A method of analyzing statements in a programming language which can tolerate a considerable inaccuracy in their specification is proposed. This method involves principles at present mainly confined to studies in the area of artificial intelligence such as feature extraction, approximate tree matching, and strategy improvement by feedback from the matching process. A pilot program incorporating the principles is described and preliminary operating results are presented. A final section surveys further principles which are currently being investigated.", 9076 acknowledgement = ack-nhfb, 9077 classcodes = "C4240 (Programming and algorithm theory)", 9078 classification = "723", 9079 corpsource = "Imperial Coll. Sci. and Technol., London, UK", 9080 journalabr = "Commun ACM", 9081 keywords = "adaptive correction; artificial intelligence; automatic parsing; compiler; computer metatheory; computer programming languages; linguistic pattern matching; program statements; programming; programming languages; syntax analysis; theory", 9082 treatment = "T Theoretical or Mathematical", 9083} 9084 9085@Article{Richman:1973:VE, 9086 author = "P. L. Richman", 9087 title = "Variable-Precision Exponentiation", 9088 journal = j-CACM, 9089 volume = "16", 9090 number = "1", 9091 pages = "38--40", 9092 month = jan, 9093 year = "1973", 9094 CODEN = "CACMA2", 9095 ISSN = "0001-0782", 9096 MRclass = "65D20", 9097 MRnumber = "51 4631", 9098 mrreviewer = "V. V. Ivanov", 9099 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9100 bibsource = "Compendex database", 9101 abstract = "A previous paper presented an efficient algorithm, called the Recomputation Algorithm, for evaluating a rational expression to within any desired tolerance on a computer which performs variable-precision arithmetic operations. The Recomputation Algorithm can be applied to expressions involving any variable-precision operations having $O(10^(-p) + \sum_i|E_i|)$ error bounds, where $p$ denotes the operation's precision and $E_i$ denotes the error in the operation's $i$-th argument. \par This paper presents an efficient variable-precision exponential operation with an error bound of the above order. Other operations such as log, sin, and cos, which have simple series expansions, can be handled similarly.", 9102 acknowledgement = ack-nhfb, 9103 classcodes = "C5230 (Digital arithmetic methods)", 9104 classification = "723; 921", 9105 corpsource = "Bell Telephone Labs. Inc., Denver, CO, USA", 9106 journalabr = "Commun ACM", 9107 keywords = "computer programming; digital arithmetic; error analysis; exponential function; exponentiation; interval arithmetic; mathematical programming; variable precision; variable-precision", 9108 treatment = "T Theoretical or Mathematical", 9109} 9110 9111@Article{Crawford:1973:RBS, 9112 author = "C. R. Crawford", 9113 title = "Reduction of a Band-Symmetric Generalized Eigenvalue Problem", 9114 journal = j-CACM, 9115 volume = "16", 9116 number = "1", 9117 pages = "41--44", 9118 month = jan, 9119 year = "1973", 9120 CODEN = "CACMA2", 9121 ISSN = "0001-0782", 9122 MRclass = "65F15", 9123 MRnumber = "51 7266", 9124 mrreviewer = "W. Niethammer", 9125 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9126 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/gvl.bib and ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 9127 abstract = "An algorithm is described for reducing a generalized eigenvalue problem to an ordinary problem, in case A and B are symmetric band matrices with B positive definite. If n is the order of the matrix and m the bandwidth, the matrices A and B are partitioned into m-by-m blocks; and the algorithm is described in terms of these blocks. The algorithm reduces the generalized problem to an ordinary eigenvalue problem for a symmetric band matrix C whose bandwidth is the same as A and B. The algorithm is similar to those of Rutishauser and Schwartz for the reduction of symmetric matrices to band form. The calculation of C requires order N**2m operation. The round-off error in the calculation of C is of the same order as the sum of the errors at each of the n/m steps of the algorithm, the latter errors being largely determined by the condition of B with respect to inversion.", 9128 acknowledgement = ack-nhfb, 9129 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 9130 classification = "723; 921", 9131 corpsource = "Univ. Toronto, Ont., Canada", 9132 journalabr = "Commun ACM", 9133 keywords = "computer programming --- Subroutines; generalized eigenvalues; mathematical techniques; symmetric band matrices", 9134 keywords = "eigenvalues and eigenfunctions; generalized eigenvalues; matrix algebra; reduction; symmetric band matrices", 9135 kwds = "nla, geig, band matrix, symmetric matrix", 9136 treatment = "T Theoretical or Mathematical", 9137} 9138 9139@Article{Blount:1973:PAC, 9140 author = "S. E. Blount and L. Fein", 9141 title = "The practical aspect of computer science education --- discussion", 9142 journal = j-CACM, 9143 volume = "16", 9144 number = "1", 9145 pages = "45--46", 9146 month = jan, 9147 year = "1973", 9148 CODEN = "CACMA2", 9149 ISSN = "0001-0782", 9150 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9151 acknowledgement = ack-nhfb, 9152 classcodes = "C0220 (Computing education and training)", 9153 corpsource = "Digital Equipment Corp., Acton, MA, USA", 9154 keywords = "computer engineering; computer science; curriculum; digital computers; education; systems design", 9155 treatment = "G General Review", 9156} 9157 9158@Article{Bays:1973:NWC, 9159 author = "C. Bays", 9160 title = "A note on when to chain overflow items within a direct-access table", 9161 journal = j-CACM, 9162 volume = "16", 9163 number = "1", 9164 pages = "46--47", 9165 month = jan, 9166 year = "1973", 9167 CODEN = "CACMA2", 9168 ISSN = "0001-0782", 9169 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9170 acknowledgement = ack-nhfb, 9171 classcodes = "C6130 (Data handling techniques)", 9172 corpsource = "Univ. South Carolina, Columbia, SC, USA", 9173 keywords = "chaining; collision; data handling; direct access table; hash code; information; open hash; overflow items; retrieval", 9174 treatment = "T Theoretical or Mathematical", 9175} 9176 9177@Article{Atkins:1973:MRA, 9178 author = "M. S. Atkins", 9179 title = "Mutual recursion in {Algol 60} using restricted compilers", 9180 journal = j-CACM, 9181 volume = "16", 9182 number = "1", 9183 pages = "47--48", 9184 month = jan, 9185 year = "1973", 9186 CODEN = "CACMA2", 9187 ISSN = "0001-0782", 9188 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9189 acknowledgement = ack-nhfb, 9190 classcodes = "C6140D (High level languages); C6150C (Compilers, interpreters and other processors)", 9191 corpsource = "Univ. Warwick, Coventry, UK", 9192 keywords = "ALGOL; ALGOL 60; mutual recursion; program compilers; restricted compilers", 9193 treatment = "P Practical", 9194} 9195 9196@Article{Gallaher:1973:AAM, 9197 author = "L. J. Gallaher", 9198 title = "{ACM} Algorithm 440: {A} Multidimensional {Monte} {Carlo} Quadrature with Adaptive Stratified Sampling", 9199 journal = j-CACM, 9200 volume = "16", 9201 number = "1", 9202 pages = "49--50", 9203 month = jan, 9204 year = "1973", 9205 CODEN = "CACMA2", 9206 ISSN = "0001-0782", 9207 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9208 acknowledgement = ack-nhfb, 9209 classcodes = "B0290M (Numerical integration and differentiation); C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 9210 corpsource = "Georgia Inst. Technol., Atlanta, GA, USA", 9211 keywords = "adaptive quadrature; ALGOL; integral; integration; Monte Carlo methods; Monte Carlo Quadrature; multidimensional; sampling; sequential stratification; stratified; subroutines", 9212 treatment = "P Practical", 9213} 9214 9215@Article{Knop:1973:AAR, 9216 author = "R. E. Knop", 9217 title = "{ACM} Algorithm 441: Random samples from the dipole distribution [{G5}]", 9218 journal = j-CACM, 9219 volume = "16", 9220 number = "1", 9221 pages = "51--51", 9222 month = jan, 9223 year = "1973", 9224 CODEN = "CACMA2", 9225 ISSN = "0001-0782", 9226 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9227 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1973.bib", 9228 acknowledgement = ack-nhfb, 9229 classcodes = "C7310 (Mathematics computing)", 9230 corpsource = "Florida State Univ., Tallahassee, FL, USA", 9231 country = "USA", 9232 descriptors = "RVG;", 9233 enum = "7514", 9234 keywords = "dipole distribution; FORTRAN; probability density; random deviates; random number; statistics; subroutines", 9235 language = "English", 9236 references = "0", 9237 treatment = "P Practical", 9238} 9239 9240@Article{Hill:1973:AAN, 9241 author = "G. W. Hill and A. W. Davis", 9242 title = "{ACM} Algorithm 442: Normal deviate [{S14}]", 9243 journal = j-CACM, 9244 volume = "16", 9245 number = "1", 9246 pages = "51--52", 9247 month = jan, 9248 year = "1973", 9249 CODEN = "CACMA2", 9250 ISSN = "0001-0782", 9251 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9252 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1973.bib", 9253 acknowledgement = ack-nhfb, 9254 classcodes = "C7310 (Mathematics computing)", 9255 corpsource = "CSIRO, Glen Osmond, Australia", 9256 country = "USA", 9257 descriptors = "RVG;", 9258 enum = "7393", 9259 keywords = "ALGOL; normal deviate; normal distribution inverse; probit; statistics; subroutines; Taylor series approximation; transform", 9260 language = "English", 9261 references = "0", 9262 treatment = "P Practical", 9263} 9264 9265@Article{Merrill:1973:RCR, 9266 author = "R. D. Merrill", 9267 title = "Representation of Contours and Regions for Efficient Computer Search", 9268 journal = j-CACM, 9269 volume = "16", 9270 number = "2", 9271 pages = "69--82", 9272 month = feb, 9273 year = "1973", 9274 CODEN = "CACMA2", 9275 ISSN = "0001-0782", 9276 MRclass = "68A10", 9277 MRnumber = "51 7362", 9278 mrreviewer = "Arnold Griffith", 9279 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9280 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.75.bib", 9281 abstract = "A novel computer-searchable representation for the three basic pictorial features, contour maps, region coverage, and line structures, is described. The representation, which has practical storage requirements, provides a rapid means of searching large files for data associated with geometric position as well as with attribute value. An application of this representation to handling terrain information illustrates its utility. The algebraic properties of the data structure make it computationally easy to determine whether a point lies within a closed boundary; compute the area contained by a closed boundary; generate the closed boundary representing the union or intersection of two closed boundaries; and determine the neighboring boundaries to a point and the minimum distances between them and the point. Pertinent to mapping.", 9282 acknowledgement = ack-nhfb, 9283 classcodes = "C6130 (Data handling techniques); C7400 (Engineering computing)", 9284 classification = "405; 723", 9285 corpsource = "Lockheed Palo Alto Res. Laboratory, CA, USA", 9286 journalabr = "Commun ACM", 9287 keywords = "applications of computers; cartography; computer graphics; computer searchable structure; contour map representation; data handling; data processing --- Data Handling; data processing --- Data Structures; engineering; graphic data retrieval; maps and mapping; region boundary representation", 9288 treatment = "T Theoretical or Mathematical", 9289} 9290 9291@Article{Crespi-Reghizzi:1973:UGI, 9292 author = "S. Crespi-Reghizzi and M. A. Melkanoff and L. Lichten", 9293 title = "The Use of Grammatical Inference for Designing Programming Languages", 9294 journal = j-CACM, 9295 volume = "16", 9296 number = "2", 9297 pages = "83--90", 9298 month = feb, 9299 year = "1973", 9300 CODEN = "CACMA2", 9301 ISSN = "0001-0782", 9302 MRclass = "68A30", 9303 MRnumber = "50 15446", 9304 mrreviewer = "Leon Levy", 9305 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9306 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/colt.bib", 9307 abstract = "Both in designing a new programming language and in extending an existing language, the designer is faced with the problem of deriving a ``natural'' grammar for the language. We are proposing an interactive approach to the grammar design problem wherein the designer presents a sample of sentences and structures as input to a grammatical inference algorithm. The algorithm then constructs a grammar which is a reasonable generalization of the examples submitted by the designer. \par The implementation is presently restricted to a subclass of operator precedence grammars, but a second algorithm is outlined which applies to a larger class of context-free grammars.", 9308 acknowledgement = ack-nhfb, 9309 classcodes = "C4210 (Formal logic); C6140 (Programming languages)", 9310 classification = "723", 9311 corpsource = "Univ. California, Los Angeles, CA, USA", 9312 journalabr = "Commun ACM", 9313 keywords = "computer programming languages; context; context-free grammars; extensible languages; free grammars; grammar design; grammatical inference; identification in the limit; inference; language definition; operator; precedence grammars; programming languages", 9314 treatment = "P Practical", 9315} 9316 9317@Article{Gimpel:1973:TDP, 9318 author = "J. F. Gimpel", 9319 title = "A Theory of Discrete Patterns and Their Implementation in {SNOBOL4}", 9320 journal = j-CACM, 9321 volume = "16", 9322 number = "2", 9323 pages = "91--100", 9324 month = feb, 9325 year = "1973", 9326 CODEN = "CACMA2", 9327 ISSN = "0001-0782", 9328 MRclass = "68A15 (68A45)", 9329 MRnumber = "52 7198", 9330 mrreviewer = "John K. Debenham", 9331 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9332 bibsource = "Compendex database", 9333 abstract = "The notion of a discrete pattern is formalized and certain properties deduced. A pattern is shown to be a generalization of a formal language. Algorithms for implementing the kinds of patterns in SNOBOL4 are given. The general approach is to create, in-so-far as possible, a bottom-up parse from a top-down specification.", 9334 acknowledgement = ack-nhfb, 9335 classcodes = "C4210 (Formal logic); C6140 (Programming languages)", 9336 classification = "723", 9337 corpsource = "Bell Telephone Labs., Holmdel, NJ, USA", 9338 journalabr = "Commun ACM", 9339 keywords = "computer programming languages; data processing --- Data Structures; discrete patterns; formal language; formal languages; parsing; pattern implementation; pattern matching; pattern recognition systems; pattern theory; patterns; programming languages; SNOBOL4; string processing", 9340 treatment = "T Theoretical or Mathematical", 9341} 9342 9343@Article{Rokne:1973:AES, 9344 author = "J. Rokne", 9345 title = "Automatic Errorbounds for Simple Zeros of Analytic Functions", 9346 journal = j-CACM, 9347 volume = "16", 9348 number = "2", 9349 pages = "101--104", 9350 month = feb, 9351 year = "1973", 9352 CODEN = "CACMA2", 9353 ISSN = "0001-0782", 9354 MRclass = "65E05", 9355 MRnumber = "51 4638", 9356 mrreviewer = "E. Maliszewski", 9357 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9358 bibsource = "Compendex database", 9359 abstract = "The Cauchy-Ostrowski theorem on convergence of Newton iterates for an analytic function in one variable is extended to include computational errors using complex interval arithmetic. Several numerical examples are given for polynomials with real and complex roots and one example for the Bessel function of the first kind.", 9360 acknowledgement = ack-nhfb, 9361 classcodes = "B0290B (Error analysis in numerical methods); B0290D (Functional analysis); B0290K (Nonlinear and functional equations); C4110 (Error analysis in numerical methods); C4120 (Functional analysis); C4150 (Nonlinear and functional equations)", 9362 classification = "723", 9363 corpsource = "Univ. Calgary, Alta., Canada", 9364 journalabr = "Commun ACM", 9365 keywords = "analysis; analytic functions; automatic errorbounds; Bessel functions; Cauchy-Ostrowski theorem; complex interval arithmetic; complex intervals; convergence of numerical methods; data processing --- Data Handling; data processing --- Data Structures; error; interval arithmetic; iterative methods; mathematical techniques; Newton's method; poles and zeros; polynomials; real interval arithmetic; real intervals; simple zeros; zeros of Bessel functions; zeros of polynomials", 9366 treatment = "T Theoretical or Mathematical", 9367} 9368 9369@Article{Brent:1973:RRT, 9370 author = "Richard P. Brent", 9371 title = "Reducing the Retrieval Time of Scatter Storage Techniques", 9372 journal = j-CACM, 9373 volume = "16", 9374 number = "2", 9375 pages = "105--109", 9376 month = feb, 9377 year = "1973", 9378 CODEN = "CACMA2", 9379 ISSN = "0001-0782", 9380 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9381 bibsource = "Compendex database", 9382 note = "Modification of open addressing with double hashing to reduce the average number of probes for a successful search.", 9383 abstract = "A new method for entering and retrieving information in a hash table is described. The method is intended to be efficient if most entries are looked up several times. The expected number of probes to look up an entry, predicted theoretically and verified by Monte Carlo experiments, is considerably less than for other comparable methods if the table is nearly full. An example of a possible Fortran implementation is given.", 9384 acknowledgement = ack-nhfb, 9385 classcodes = "C6120 (File organisation)", 9386 classification = "723; 901", 9387 journalabr = "Commun ACM", 9388 keywords = "address; address calculation; addressing; calculation; computer programming languages --- Fortran; content addressing; data storage, digital --- Random Access; file organisation; file searching; has; has code; hash addressing; information retrieval systems; linear probing; linear quotient; linear quotient method; method; retrieval time; scatter storage techniques; storage management; symbol table", 9389 treatment = "P Practical", 9390} 9391 9392@Article{Graham:1973:SDE, 9393 author = "Robert M. Graham and Gerald J. {Clancy, Jr.} and David B. DeVaney", 9394 title = "A software design and evaluation system", 9395 journal = j-CACM, 9396 volume = "16", 9397 number = "2", 9398 pages = "110--116", 9399 month = feb, 9400 year = "1973", 9401 CODEN = "CACMA2", 9402 ISSN = "0001-0782", 9403 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9404 bibsource = "Compendex database", 9405 abstract = "A critical failure of current software system design and implementation methodology is that the performance of a proposed design is not evaluated before it is actually implemented. In this paper the reasons for this failure are explored, and a new methodology which overcomes many of the difficulties is proposed. A system which integrates performance evaluation with design and implementation is described. This system is based on a simple, high level language which is used to describe the evolving system at all stages of its development. The source language description is used as direct input to performance analysis and simulation routines. using the performance information obtained from these routines as feedback, the problems which adversely affect performance are detected early enough so that they can be corrected without costly major reimplementation of the proposed system.", 9406 acknowledgement = ack-nhfb, 9407 classcodes = "C6150C (Compilers, interpreters and other processors); C6150J (Operating systems)", 9408 classification = "723", 9409 corpsource = "Univ. California, Berkeley, CA, USA", 9410 journalabr = "Commun ACM", 9411 keywords = "compilers; computer programming languages; computer software; computer systems programming; computer systems programming --- Supervisory and Executive Programs; data processing --- Data Structures; debugging; des language; evaluation; executive programs; high level language; performance analysis; program maintenance; program processors; simulation; software design; supervisory and; supervisory systems; system programming", 9412 treatment = "P Practical", 9413} 9414 9415@Article{Balzer:1973:OIC, 9416 author = "R. M. Balzer", 9417 title = "An overview of the {ISPL} computer system design", 9418 journal = j-CACM, 9419 volume = "16", 9420 number = "2", 9421 pages = "117--122", 9422 month = feb, 9423 year = "1973", 9424 CODEN = "CACMA2", 9425 ISSN = "0001-0782", 9426 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9427 bibsource = "Compendex database", 9428 abstract = "This paper explores the advantages of the concurrent design of the language, operating system, and machine (via microcode) to create an interactive programming laboratory. It describes the synergistic effect that the freedom to move and alter features from one of these domains to another has had on the design of this system (which has not been implemented). This freedom simplified both incremental compilation and the system's addressing structure, and centralized the communication mechanisms enabling the construction of hierarchical subsystems. It also suggested an important new concept for operating systems: separation of the scheduling from the maintenance functions in resource allocation. This separation enables incorporation of new scheduling algorithms (decision of what to do) without endangering the system integration (correctly performing the scheduling decisions).", 9429 acknowledgement = ack-nhfb, 9430 classcodes = "C6100 (Software techniques and systems); C6150J (Operating systems)", 9431 classification = "723", 9432 journalabr = "Commun ACM", 9433 keywords = "computer programming languages; computer system design; computer systems, digital --- Time Sharing; computers --- Data Communication Systems; hierarchical subsystems; incremental compilation; interactive programming laboratory; interprogram communication; ISPL; language; machine; operating system; operating systems (computers); programming", 9434 treatment = "G General Review; T Theoretical or Mathematical", 9435} 9436 9437@Article{Fritsch:1973:AAS, 9438 author = "F. N. Fritsch and R. E. Shafer and W. P. Crowley", 9439 title = "{ACM} Algorithm 443: Solution of the Transcendental Equation $w e^w = x$", 9440 journal = j-CACM, 9441 volume = "16", 9442 number = "2", 9443 pages = "123--124", 9444 month = feb, 9445 year = "1973", 9446 CODEN = "CACMA2", 9447 ISSN = "0001-0782", 9448 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9449 acknowledgement = ack-nhfb, 9450 classcodes = "B0290D (Functional analysis); C4120 (Functional analysis); C7310 (Mathematics computing)", 9451 corpsource = "Univ. California, Livermore, CA, USA", 9452 keywords = "FORTRAN; function evaluation; iteration; iterative methods; subroutines; transcendental equation", 9453 treatment = "T Theoretical or Mathematical", 9454 xxauthor = "F. N. Fritsch and R. E. Shafer and W. P. Gowley", 9455} 9456 9457@Article{Austing:1973:CSC, 9458 author = "Richard H. Austing and Gerald L. Engel", 9459 title = "A Computer Science Course Program for Small Colleges", 9460 journal = j-CACM, 9461 volume = "16", 9462 number = "3", 9463 pages = "139--147", 9464 month = mar, 9465 year = "1973", 9466 CODEN = "CACMA2", 9467 ISSN = "0001-0782", 9468 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9469 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 9470 abstract = "This report gives recommendations for the content, implementation, and operation of a program of computer science courses specifically directed to small colleges. Implementation problems are discussed, specifically within the constraints of limited faculty and for the purposes of satisfying a wide variety of objectives. Detailed descriptions of four courses are given; suggestions are made for more advanced work; and an extensive library list is included.", 9471 acknowledgement = ack-nhfb, 9472 classcodes = "C0220 (Computing education and training)", 9473 classification = "723; 901", 9474 corpsource = "Univ. Maryland, College Park, MD, USA", 9475 journalabr = "Commun ACM", 9476 keywords = "computer science education; data processing", 9477 keywords = "computer organization course; computer science course; education; file organization course; programming course; reviews; small colleges; social implications course; universities", 9478 treatment = "B Bibliography; G General Review", 9479} 9480 9481@Article{Wagner:1973:CPM, 9482 author = "Robert A. Wagner", 9483 title = "Common Phrases and Minimum-Space Text Storage", 9484 journal = j-CACM, 9485 volume = "16", 9486 number = "3", 9487 pages = "148--152", 9488 month = mar, 9489 year = "1973", 9490 CODEN = "CACMA2", 9491 ISSN = "0001-0782", 9492 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9493 bibsource = "Compendex database", 9494 abstract = "A method for saving storage space for text strings, such as compiler diagnostic messages, is described. The method relies on hand selection of a set of text strings which are common to one or more messages. These phrases are then stored only once. The storage technique gives rise to a mathematical optimization problem: determine how each message should use the available phrases to minimize its storage requirement. This problem is nontrivial when phrases which overlap exist. However, a dynamic programming algorithm is presented which solves the problem in time which grows linearly with the number of characters in the text. Algorithm 444 applies to this paper.", 9495 acknowledgement = ack-nhfb, 9496 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C6120 (File organisation); C6150G (Diagnostic, testing, debugging and evaluating systems)", 9497 classification = "723", 9498 corpsource = "Cornell Univ., NY, USA", 9499 journalabr = "Commun ACM", 9500 keywords = "common phrases; computer operating systems --- Program Compilers; computer programming; diagnostic messages; dynamic programming; error messages; file organisation; minimum space; optimization; program diagnostics; text storage", 9501 treatment = "P Practical", 9502} 9503 9504@Article{Feinroth:1973:TUF, 9505 author = "Y. Feinroth and E. Franceschini and M. Goldstein", 9506 title = "Telecommunications Using a Front-End Minicomputer", 9507 journal = j-CACM, 9508 volume = "16", 9509 number = "3", 9510 pages = "153--160", 9511 month = mar, 9512 year = "1973", 9513 CODEN = "CACMA2", 9514 ISSN = "0001-0782", 9515 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9516 bibsource = "Compendex database", 9517 abstract = "The use of a front-end minicomputer to provide varied remote terminal access to a large scale computer is considered. The problems of embedding telecommunications I/O within an operating system are discussed, and it is shown how the decentralization of intelligence acquired by front-end processing vastly simplifies the problem. A specific implementation is discussed with emphasis on the main processor-minicomputer link, the hardware-software implementation, the effect on the main processor operating system, and an assessment of the advantages over a hardwired line controller.", 9518 acknowledgement = ack-nhfb, 9519 classcodes = "C5600 (Data communication equipment and techniques)", 9520 classification = "718; 723", 9521 corpsource = "New York Univ., NY, USA", 9522 journalabr = "Commun ACM", 9523 keywords = "computers; computers, miniature; digital communication systems; front end processor; front-end processor; large scale computer; minicomputer; minicomputers; operating; operating system; remote; remote job entry; systems (computers); telecommunication systems; telecommunications; terminals", 9524 treatment = "P Practical", 9525} 9526 9527@Article{Pack:1973:EMC, 9528 author = "Charles D. Pack", 9529 title = "The Effects of Multiplexing on a Computer-Communications System", 9530 journal = j-CACM, 9531 volume = "16", 9532 number = "3", 9533 pages = "161--168", 9534 month = mar, 9535 year = "1973", 9536 CODEN = "CACMA2", 9537 ISSN = "0001-0782", 9538 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9539 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/network.bib", 9540 abstract = "A study is made of the way in which asynchronous time division multiplexing changes the stochastic nature of the arrival process from a user to the computer and, consequently, affects the performance of a time-shared computer-communications system. It is concluded that while, for certain values of system parameters, there is noticeable improvement in the performance of the computer (model), in the sense that time-shared scheduling delays are reduced, these improvements are offset by the transmission delays imposed by multiplexing so that there may be little or no change in the computer-communications system performance. Analytical and simulation results are based on the model of the computer-communications system being an M/D/I queue (the multiplexor) in tandem with a single exponential server (the computer). Analytical results include a general description of the output process of an M/D/1 queue and the conditions under which this output process is approximately Poisson.", 9541 acknowledgement = ack-nhfb, 9542 classcodes = "C5600 (Data communication equipment and techniques)", 9543 classification = "718; 722; 723", 9544 corpsource = "Bell Telephone Labs. Inc., Murray Hill, NJ, USA", 9545 journalabr = "Commun ACm", 9546 keywords = "computer communications; computer programming --- Subroutines; computers; digital communication systems; multiplexing; operating systems; scheduling algorithms; systems; time sharing; time-sharing", 9547 treatment = "T Theoretical or Mathematical", 9548} 9549 9550@Article{Conway:1973:DID, 9551 author = "Richard W. Conway and Thomas R. Wilcox", 9552 title = "Design and Implementation of Diagnostic Compiler for {PL/I}", 9553 journal = j-CACM, 9554 volume = "16", 9555 number = "3", 9556 pages = "169--179", 9557 month = mar, 9558 year = "1973", 9559 CODEN = "CACMA2", 9560 ISSN = "0001-0782", 9561 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9562 bibsource = "Compendex database", 9563 abstract = "PL/C is a compiler for a dialect for PL/I. The design objective was to provide a maximum degree of diagnostic assistance in a batch processing environment. For the most part this assistance is implicit and is provided automatically by the compilers. The most remarkable characteristic of PL/C is its perseverance --- it completes translation of every program submitted and continues execution until a user-established error limit is reached. This requires that the compiler repair errors encountered during both translation and execution, and the design of PL/C is dominated by this consideration. PL/C also introduces several explicit user-controlled facilities for program testing. To accommodate these extensions to PL/I without abandoning compatibility with the IBM compiler, PL/C permits ``pseudo comments'' --- constructions whose contents can optionally be considered either source text or comment. In spite of the diagnostic effort PL/C is a fast and efficient processor. It effectively demonstrates that compilers can provide better diagnostic assistance than is customarily offered, even when a sophisticated source language is employed, and that this assistance need not be prohibitively costly.", 9564 acknowledgement = ack-nhfb, 9565 classcodes = "C6140D (High level languages); C6150C (Compilers, interpreters and other processors); C6150G (Diagnostic, testing, debugging and evaluating systems)", 9566 classification = "723", 9567 corpsource = "Cornell Univ., NY, USA", 9568 journalabr = "Commun ACM", 9569 keywords = "batch processing environment; batch-processing; computer operating systems; computer programming languages --- Program Debugging; computer programming languages --- Program Diagnostics; design; diagnostic compiler; diagnostics; implementation; PL/1; PL/C; PL/I; program; program compilers", 9570 treatment = "P Practical", 9571 xxtitle = "Design and implementation of a diagnostic compiler for {PL/I}", 9572} 9573 9574@Article{Salzer:1973:GCO, 9575 author = "H. E. Salzer", 9576 title = "{Gray} code and the +or-sign sequence when +or-f(+or-f(+or-f( . . +or-f(x) . . .))) is ordered", 9577 journal = j-CACM, 9578 volume = "16", 9579 number = "3", 9580 pages = "180--180", 9581 month = mar, 9582 year = "1973", 9583 CODEN = "CACMA2", 9584 ISSN = "0001-0782", 9585 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9586 note = "Check title??", 9587 acknowledgement = ack-nhfb, 9588 classcodes = "C6130 (Data handling techniques)", 9589 keywords = "binary sequences; binary system; codes; functions; Galois sum; Gray code; ordering; positive monotonic; sign sequences", 9590 treatment = "T Theoretical or Mathematical", 9591} 9592 9593@Article{Bookstein:1973:HST, 9594 author = "Abraham Bookstein", 9595 title = "On {Harrison}'s Substring Testing Technique", 9596 journal = j-CACM, 9597 volume = "16", 9598 number = "3", 9599 pages = "180--181", 9600 month = mar, 9601 year = "1973", 9602 CODEN = "CACMA2", 9603 ISSN = "0001-0782", 9604 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9605 acknowledgement = ack-nhfb, 9606 classcodes = "C6130 (Data handling techniques)", 9607 corpsource = "Univ. Chicago, IL, USA", 9608 keywords = "data handling; hashing; information storage; retrieval; substring testing technique", 9609 treatment = "P Practical", 9610} 9611 9612@Article{Payne:1973:GEP, 9613 author = "W. H. Payne", 9614 title = "Graduate Education: The {Ph.D.} Glut", 9615 journal = j-CACM, 9616 volume = "16", 9617 number = "3", 9618 pages = "181--182", 9619 month = mar, 9620 year = "1973", 9621 CODEN = "CACMA2", 9622 ISSN = "0001-0782", 9623 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9624 note = "See response and rebuttal \cite{Freeman:1974:GEP}.", 9625 acknowledgement = ack-nhfb, 9626 classcodes = "C0220 (Computing education and training)", 9627 corpsource = "Univ. Illinois, Urbana-Champaign, IL, USA", 9628 keywords = "accreditation; education; graduate education; Ph.D. glut; Ph.D. production", 9629 treatment = "G General Review", 9630} 9631 9632@Article{Wagner:1973:AAA, 9633 author = "R. A. Wagner", 9634 title = "{ACM} Algorithm 444: An Algorithm for Extracting Phrases in a Space-Optimal Fashion", 9635 journal = j-CACM, 9636 volume = "16", 9637 number = "3", 9638 pages = "183--185", 9639 month = mar, 9640 year = "1973", 9641 CODEN = "CACMA2", 9642 ISSN = "0001-0782", 9643 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9644 acknowledgement = ack-nhfb, 9645 classcodes = "C6130 (Data handling techniques)", 9646 corpsource = "Vanderbilt Univ., Nashville, TN, USA", 9647 keywords = "algorithm; coding; data handling; extracting phrases; information retrieval; PARSE; PL/I; subroutines; text compression", 9648 treatment = "P Practical", 9649} 9650 9651@Article{Chang:1973:AAB, 9652 author = "Shi-Kuo Chang", 9653 title = "{ACM} Algorithm 445: Binary Pattern Reconstruction from Projections", 9654 journal = j-CACM, 9655 volume = "16", 9656 number = "3", 9657 pages = "185--186", 9658 month = mar, 9659 year = "1973", 9660 CODEN = "CACMA2", 9661 ISSN = "0001-0782", 9662 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9663 acknowledgement = ack-nhfb, 9664 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition); C7800 (Other computer applications)", 9665 corpsource = "Cornell Univ., Ithaca, NY, USA", 9666 keywords = "ALGOL; binary pattern; compression; data; picture processing; projections; reconstruction; subroutines", 9667 treatment = "P Practical; T Theoretical or Mathematical", 9668} 9669 9670@Article{Lau:1973:BPR, 9671 author = "J. Lau", 9672 title = "Binary pattern reconstruction from projections", 9673 journal = j-CACM, 9674 volume = "16", 9675 number = "3", 9676 pages = "186--186", 9677 month = mar, 9678 year = "1973", 9679 CODEN = "CACMA2", 9680 ISSN = "0001-0782", 9681 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9682 acknowledgement = ack-nhfb, 9683 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition); C7800 (Other computer applications)", 9684 corpsource = "Univ. British Columbia, Vancouver, BC, Canada", 9685 keywords = "ALGOL; binary pattern reconstruction; compression; data; picture processing; projections; subroutines", 9686 treatment = "P Practical; T Theoretical or Mathematical", 9687} 9688 9689@Article{Hassitt:1973:IHL, 9690 author = "A. Hassitt and J. W. Lageschulte and L. E. Lyon", 9691 title = "Implementation of a High Level Language Machine", 9692 journal = j-CACM, 9693 volume = "16", 9694 number = "4", 9695 pages = "199--212", 9696 month = apr, 9697 year = "1973", 9698 CODEN = "CACMA2", 9699 ISSN = "0001-0782", 9700 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9701 bibsource = "Compendex database", 9702 abstract = "Computing machines which directly execute the statements of a high level language have been proposed in the past. This report describes the actual implementation of such a machine: it is a computer whose ``machine language'' is APL. The machine is fully operational and correctly executes almost all of the APL operations on scalars, vectors, and arrays. The machine automatically allocates memory, executes statements, calls functions, converts numbers from one type to another, checks subscripts, and automatically detects many types of programmer errors.", 9703 acknowledgement = ack-nhfb, 9704 classcodes = "C5220 (Computer architecture); C6140D (High level languages)", 9705 classification = "723", 9706 corpsource = "IBM Palo Alto, CA, USA", 9707 journalabr = "Commun ACM", 9708 keywords = "APL; computer architecture; computer operating systems --- Program Compilers; computer programming languages; computing machines; emulators; high level language; high level language machine; implementation; interpreters; microprogramming; procedure oriented languages", 9709 treatment = "P Practical", 9710} 9711 9712@Article{Williams:1973:AMH, 9713 author = "John G. Williams", 9714 title = "Asymmetric Memory Hierarchies", 9715 journal = j-CACM, 9716 volume = "16", 9717 number = "4", 9718 pages = "213--222", 9719 month = apr, 9720 year = "1973", 9721 CODEN = "CACMA2", 9722 ISSN = "0001-0782", 9723 MRclass = "68A50", 9724 MRnumber = "51 2378", 9725 mrreviewer = "I. Kaufmann", 9726 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9727 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/storage.bib", 9728 abstract = "A study is presented of some of the system implications of memory hierarchies in which the backing or secondary store has a very small read time, relative of both the time required for writing and to the read time of conventional backing storage devices. Several analytic models are introduced, and it is shown that such hierarchies may operate in ways which differ from those of more conventional hierarchies. In particular, it is shown that it may not be necessary to multiprogram in such a situation. \par In the past, backing storage devices have been roughly symmetric with respect to their read and write times. This situation may not continue, as several devices are currently under development which may have a very small read-time/write-time ratio. This study places particular emphasis on one such system-the RCA read/write holographic optical memory.", 9729 acknowledgement = ack-nhfb, 9730 classcodes = "C5320Z (Other digital storage); C6120 (File organisation)", 9731 classification = "722; 723; 741", 9732 corpsource = "RCA, Princeton, NJ, USA", 9733 journalabr = "Commun ACM", 9734 keywords = "asymmetric memory; asymmetric memory hierarchies; asymmetric memory hierarchy; computer systems programming --- Multiprogramming; data storage, optical; demand paging; file organisation; holographic; holographic optical memory; holography; memory device; memory hierarchy; optical memory; optical stores; paging; Performance Evaluation: Analytic; storage device; storage hierarchy; virtual memory", 9735 treatment = "P Practical", 9736} 9737 9738@Article{Kuki:1973:SSA, 9739 author = "H. Kuki and W. J. Cody", 9740 title = "A Statistical Study of the Accuracy of Floating Point Number Systems", 9741 journal = j-CACM, 9742 volume = "16", 9743 number = "4", 9744 pages = "223--230", 9745 month = apr, 9746 year = "1973", 9747 CODEN = "CACMA2", 9748 ISSN = "0001-0782", 9749 MRclass = "68A20 (65G05)", 9750 MRnumber = "51 2344", 9751 mrreviewer = "I. Kaufmann", 9752 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9753 bibsource = "Compendex database; garbo.uwasa.fi:/pc/doc-soft/fpbiblio.txt", 9754 abstract = "This paper presents the statistical results of tests of the accuracy of certain arithmetic systems in evaluating sums, products and inner products, and analytic error estimates for some of the computations. The arithmetic systems studied are 6-digit hexadecimal and 22-digit binary floating point number representations combined with the usual chop and round modes of arithmetic with various numbers of guard digits, and with a modified round mode with guard digits. In a certain sense, arithmetic systems differing only in their use of binary or hexadecimal number representations are shown to be approximately statistically equivalent in accuracy. Further, the usual round mode with guard digits is shown to be statistically superior in accuracy to the usual chop mode in all cases save one. The modified round mode is found to be superior to the chop mode in all cases.", 9755 acknowledgement = ack-nhfb # " and " # ack-nj, 9756 classcodes = "C5230 (Digital arithmetic methods)", 9757 classification = "723", 9758 corpsource = "Univ. Chicago, IL, USA", 9759 journalabr = "Commun ACM", 9760 keywords = "accuracy; arithmetic; computer programming; digital arithmetic; error analysis; floating point arithmetic; floating point number systems; guard digits; number representation; rounding; statistical study", 9761 treatment = "T Theoretical or Mathematical", 9762} 9763 9764@Article{Burkhard:1973:SAB, 9765 author = "W. A. Burkhard and R. M. Keller", 9766 title = "Some Approaches to Best-Match File Searching", 9767 journal = j-CACM, 9768 volume = "16", 9769 number = "4", 9770 pages = "230--236", 9771 month = apr, 9772 year = "1973", 9773 CODEN = "CACMA2", 9774 ISSN = "0001-0782", 9775 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9776 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/pre75.bib", 9777 abstract = "The problem of searching the set of keys in a file to find a key which is closest to a given query key is discussed. After ``closest'', in terms of a metric on the key space, is suitably defined, three file structures are presented together with their corresponding search algorithms, which are intended to reduce the number of comparisons required to achieve the desired result. These methods are derived using certain inequalities satisfied by metrics and by graph-theoretic concepts. Some empirical results are presented which compare the efficiency of the methods.", 9778 acknowledgement = ack-nhfb, 9779 classcodes = "C6120 (File organisation)", 9780 classification = "723; 901", 9781 corpsource = "Univ. California, San Diego, CA, USA", 9782 journalabr = "Commun ACM", 9783 keywords = "best match; data processing; file organisation; file searching; file structuring; heuristics; information retrieval systems", 9784 treatment = "T Theoretical or Mathematical", 9785} 9786 9787@Article{Strong:1973:RCT, 9788 author = "James P. {Strong, III} and Azriel Rosenfeld", 9789 title = "A region coloring technique for scene analysis", 9790 journal = j-CACM, 9791 volume = "16", 9792 number = "4", 9793 pages = "237--246", 9794 month = apr, 9795 year = "1973", 9796 CODEN = "CACMA2", 9797 ISSN = "0001-0782", 9798 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9799 bibsource = "Compendex database", 9800 abstract = "A method of converting a picture into a ``cartoon'' or ``map'' whose regions correspond to differently textured regions is described. Texture edges in the picture are detected, and solid regions surrounded by these (usually broken) edges are ``colored in'' using a propagation process. The resulting map is cleaned by comparing the region colors with the textures of the corresponding regions in the picture, and also by merging some regions with others according to criteria based on topology and size. The method has been applied to the construction of could cover maps from cloud cover pictures obtained by satellites.", 9801 acknowledgement = ack-nhfb, 9802 classcodes = "C5540 (Terminals and graphic displays)", 9803 classification = "405; 723; 741", 9804 corpsource = "NASA, Greenbelt, MD, USA", 9805 journalabr = "Commun ACM", 9806 keywords = "computer graphics; data processing --- Natural Sciences Applications; edge detection; maps and mapping; pattern recognition systems; picture; picture processing; processing; region colouring technique; scene analysis", 9807 treatment = "P Practical", 9808} 9809 9810@Article{Rodriguez-Rosell:1973:DIE, 9811 author = "Juan Rodriguez-Rosell and Jean-Pierre Dupuy", 9812 title = "The design, implementation, and evaluation of a working set dispatcher", 9813 journal = j-CACM, 9814 volume = "16", 9815 number = "4", 9816 pages = "247--253", 9817 month = apr, 9818 year = "1973", 9819 CODEN = "CACMA2", 9820 ISSN = "0001-0782", 9821 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9822 bibsource = "Compendex database", 9823 abstract = "The behavior of a computer system is largely dependent upon the algorithm employed to allocate the system resources to the processes competing for them. Recent research in time-sharing paging systems has developed the working set model for program behavior, and a resource allocation strategy based on this model has been proposed. Two implementations along these principles have been reported, but it seems that in neither case have further results been announced. This report discusses the design and implementation of a dispatcher based on the working set principle, presents data to permit analysis of its behavior, and indicates future directions of research on methods of controlling a computer system.", 9824 acknowledgement = ack-nhfb, 9825 classcodes = "C6150J (Operating systems)", 9826 classification = "722; 723", 9827 corpsource = "Royal Inst. Technol., Stockholm, Sweden", 9828 journalabr = "Commun ACM", 9829 keywords = "computer systems, digital; computers --- Operating Procedures; design; evaluation; implementation; operating systems; resource allocation; scheduler; software evaluation; supervisory and executive programs; supervisory systems; time sharing; time-sharing systems; working set; working set dispatcher", 9830 treatment = "T Theoretical or Mathematical", 9831 xxtitle = "Design, Implementation, and Evaluation of Working Set Dispatcher", 9832} 9833 9834@Article{Broucke:1973:AAT, 9835 author = "R. Broucke", 9836 title = "{ACM} Algorithm 446: Ten Subroutines for the Manipulation of {Chebyshev} Series", 9837 journal = j-CACM, 9838 volume = "16", 9839 number = "4", 9840 pages = "254--256", 9841 month = apr, 9842 year = "1973", 9843 CODEN = "CACMA2", 9844 ISSN = "0001-0782", 9845 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9846 acknowledgement = ack-nhfb, 9847 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 9848 corpsource = "Univ. California, Los Angeles, CA, USA", 9849 keywords = "approximations; Chebyshev approximation; Chebyshev series; curve fitting; Manipulation; negative powers; series (mathematics); subroutines", 9850} 9851 9852@Article{Ragland:1973:GCD, 9853 author = "L. C. Ragland and D. I. Good", 9854 title = "Greatest common divisor of $n$ integers and multipliers", 9855 journal = j-CACM, 9856 volume = "16", 9857 number = "4", 9858 pages = "257--257", 9859 month = apr, 9860 year = "1973", 9861 CODEN = "CACMA2", 9862 ISSN = "0001-0782", 9863 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9864 acknowledgement = ack-nhfb, 9865 classcodes = "C5230 (Digital arithmetic methods)", 9866 corpsource = "Univ. Texas, Austin, TX, USA", 9867 keywords = "Euclidean algorithm; greatest common divisor; inductive assertion method; integers; multipliers; number theory; proof of algorithms", 9868 treatment = "P Practical", 9869} 9870 9871@Article{Pager:1973:PCC, 9872 author = "David Pager", 9873 title = "On the Problem of Communicating Complex Information", 9874 journal = j-CACM, 9875 volume = "16", 9876 number = "5", 9877 pages = "275--281", 9878 month = may, 9879 year = "1973", 9880 CODEN = "CACMA2", 9881 ISSN = "0001-0782", 9882 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9883 bibsource = "Compendex database", 9884 abstract = "The nature of the difficulty involved in communicating mathematical results between scientists using a computer based information retrieval system is examined. The problem is analyzed in terms of psychological and information-processing processes, and what turns out to be a vicious circle of effects is described. The paper then considers how the presentation of information by a computer-based information retrieval system, or by other media, can be improved. Some trade-offs which affect the design of the presentation are mentioned, and a number of ideas for improvement are described. These include ways of augmenting written language by various notational and linguistic devices, the exhibition of the structure inherent in the information the authors are communicating, and a sophisticated interactive system controlled by computer.", 9885 acknowledgement = ack-nhfb, 9886 classcodes = "C7250 (Information storage and retrieval)", 9887 classification = "723; 901", 9888 corpsource = "Univ. Hawaii, Honolulu, HI, USA", 9889 journalabr = "Commun ACM", 9890 keywords = "communication; complex information; computer based information retrieval; computers --- Data Communication Systems; information; information retrieval systems; information science --- Information Retrieval; interactive system; language; mathematics; proof; psychology; system", 9891 treatment = "P Practical", 9892} 9893 9894@Article{Low:1973:PQE, 9895 author = "David W. Low", 9896 title = "Programming by Questionnaire: an Effective Way to Use Decision Tables", 9897 journal = j-CACM, 9898 volume = "16", 9899 number = "5", 9900 pages = "282--286", 9901 month = may, 9902 year = "1973", 9903 CODEN = "CACMA2", 9904 ISSN = "0001-0782", 9905 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9906 bibsource = "Compendex database", 9907 abstract = "Programming by questionnaire combines aspects of decision table programming and general purpose programming by using decision tables to construct an application program through the selection of certain source statements from a predefined file. It is proposed that programming by questionnaire is a useful compromise between general and special purpose programming for a significant class of large scale problems. The elements of the approach are discussed and an existing application is described.", 9908 acknowledgement = ack-nhfb, 9909 classcodes = "C6110 (Systems analysis and programming)", 9910 classification = "723", 9911 corpsource = "IBM Corp., Los Angeles, CA, USA", 9912 journalabr = "Commun ACM", 9913 keywords = "automatic program; automatic program generation; computer systems programming; decision tables; generation; productivity; programmer; programming; questionnaire; simulator generation", 9914 treatment = "P Practical", 9915} 9916 9917@Article{King:1973:SCU, 9918 author = "P. J. H. King and R. G. Johnson", 9919 title = "Some Comments on the Use of Ambiguous Decision Tables and Their Conversion to Computer Programs", 9920 journal = j-CACM, 9921 volume = "16", 9922 number = "5", 9923 pages = "287--290", 9924 month = may, 9925 year = "1973", 9926 CODEN = "CACMA2", 9927 ISSN = "0001-0782", 9928 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9929 bibsource = "Compendex database", 9930 abstract = "This paper comments upon recently published work on decision table translation using methods similar to rule-mask technique. The applicability of these methods under various possible conventions on overall table meaning is discussed, and it is argued that there is a place both for the multi-rule and the single-rule (or action set) convention in decision table usage.", 9931 acknowledgement = ack-nhfb, 9932 classcodes = "C6110 (Systems analysis and programming)", 9933 classification = "723", 9934 corpsource = "Birbeck Coll., Univ. London, UK", 9935 journalabr = "Commun ACM", 9936 keywords = "computer programs; computer systems programming; conversion; decision tables", 9937 treatment = "P Practical", 9938} 9939 9940@Article{Salasin:1973:HSI, 9941 author = "John Salasin", 9942 title = "Hierarchical Storage in Information Retrieval", 9943 journal = j-CACM, 9944 volume = "16", 9945 number = "5", 9946 pages = "291--295", 9947 month = may, 9948 year = "1973", 9949 CODEN = "CACMA2", 9950 ISSN = "0001-0782", 9951 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9952 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/storage.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 9953 abstract = "A probabilistic analysis is employed to determine the effect of hierarchical storage organizations on information retrieval operations. The data storage hardware is assumed to consist of n-levels of linearly connected memory hardware with increasing data access times and increasing data storage capabilities. A system might, for example, consist of fast semiconductor memory, computer core memory, extended core storage, disk memory, and data cells. Equations are derived to predict the effect of such a system on data access times using sequential files, random access files, and structured files employing multiple-hierarchical linked lists.", 9954 acknowledgement = ack-nhfb, 9955 annote = "Simple evaluation of record fetch costs using various accessing sequences.", 9956 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 9957 classification = "723; 901", 9958 corpsource = "Univ. Minneapolis, MN, USA", 9959 journalabr = "Commun ACM", 9960 keywords = "analysis; analytic; computer operating systems --- Storage Allocation; data access times; file organisation; files; hierarchical storage; information retrieval; information retrieval systems; linked lists; memory hierarchy; performance evaluation; probabilistic; random access; sequential files; structured files", 9961 treatment = "T Theoretical or Mathematical", 9962} 9963 9964@Article{Corneil:1973:MEN, 9965 author = "D. G. Corneil and C. C. Gotlieb and Y. M. Lee", 9966 title = "Minimal Event-Node Network of Project Precedence Relations", 9967 journal = j-CACM, 9968 volume = "16", 9969 number = "5", 9970 pages = "296--298", 9971 month = may, 9972 year = "1973", 9973 CODEN = "CACMA2", 9974 ISSN = "0001-0782", 9975 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9976 bibsource = "Compendex database", 9977 abstract = "A procedure for constructing a minimal event-node network to represent a set of precedence relations without parallel activities is presented. A minimal even-node network is an event-node network in which both the number of nodes and the number of arcs are the minima to preserve the given precedence relations. Counterexamples are given to show that the algorithm presented by A. C. Fisher, J. S. Liebman, and G. L. Nemhauser (1968) produces event-node networks which are not minimal. Since our procedure includes the set-covering problem, the time required may grow exponentially with the number of given activities.", 9978 acknowledgement = ack-nhfb, 9979 classcodes = "C7100 (Business and administration)", 9980 classification = "912", 9981 corpsource = "Univ. Toronto, Ont., Canada", 9982 journalabr = "Commun ACM", 9983 keywords = "event node network; event-node network; management science; management sciences; minimal; minimal event-node network; network analysis; operations research; project precedence relations", 9984 treatment = "T Theoretical or Mathematical", 9985} 9986 9987@Article{Mercer:1973:AGP, 9988 author = "Andrew Mercer and Azriel Rosenfeld", 9989 title = "An array grammar programming system", 9990 journal = j-CACM, 9991 volume = "16", 9992 number = "5", 9993 pages = "299--305", 9994 month = may, 9995 year = "1973", 9996 CODEN = "CACMA2", 9997 ISSN = "0001-0782", 9998 bibdate = "Tue Mar 25 13:26:09 MST 1997", 9999 bibsource = "Compendex database", 10000 abstract = "A package of Fortran programs has been developed that permits a user to interactively design and test array grammars. The user can control the rule selection procedure in a derivation or parse, using weighted programming matrices; he also has a choice of instance selection schemes (raster, random, parallel). Examples are given involving array languages consisting of simple geometrical patterns, as well as a language of ``neuron pictures.''", 10001 acknowledgement = ack-nhfb, 10002 classcodes = "C4210 (Formal logic); C7430 (Computer engineering)", 10003 classification = "721; 723", 10004 corpsource = "Kappa Systems Inc., Arlington, VA, USA", 10005 journalabr = "Commun ACM", 10006 keywords = "array grammar; array grammars; automata theory --- Grammars; automatic testing; CAD; computer graphics; computer programming languages; computer-aided design; Fortran programs; grammars; interactively; picture grammars; programming system; test", 10007 treatment = "A Application; T Theoretical or Mathematical", 10008} 10009 10010@Article{Reingold:1973:NLM, 10011 author = "Edward M. Reingold", 10012 title = "A Nonrecursive List Moving Algorithm", 10013 journal = j-CACM, 10014 volume = "16", 10015 number = "5", 10016 pages = "305--307", 10017 month = may, 10018 year = "1973", 10019 CODEN = "CACMA2", 10020 ISSN = "0001-0782", 10021 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10022 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 10023 abstract = "An efficient, nonrecursive algorithm is given for moving any LIST-type list. In particular, the algorithm requires no storage other than the new nodes into which the list is to be moved, and no additional bits per node for marking; the algorithm runs in time proportional to the number of nodes in the list. The original list structure is destroyed as it is moved.", 10024 acknowledgement = ack-nhfb, 10025 classcodes = "C6130 (Data handling techniques)", 10026 classification = "723", 10027 corpsource = "Univ. Illinois, Urbana-Champaign, IL, USA", 10028 journalabr = "Commun ACM", 10029 keywords = "computer programming --- Subroutines; computer programming languages; computer programming languages --- lisp; garbage collection; LISP; list moving; list processing; nonrecursive algorithm; storage management", 10030 treatment = "P Practical", 10031} 10032 10033@Article{Vos:1973:CWF, 10034 author = "H. Vos", 10035 title = "Coulomb wave functions", 10036 journal = j-CACM, 10037 volume = "16", 10038 number = "5", 10039 pages = "308--309", 10040 month = may, 10041 year = "1973", 10042 CODEN = "CACMA2", 10043 ISSN = "0001-0782", 10044 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10045 acknowledgement = ack-nhfb, 10046 classcodes = "B0290D (Functional analysis); C4120 (Functional analysis); C7310 (Mathematics computing)", 10047 corpsource = "Vrije Univ., Amsterdam, Netherlands", 10048 keywords = "Coulomb wave functions; function evaluation; mathematics; wave functions", 10049 treatment = "A Application; T Theoretical or Mathematical", 10050} 10051 10052@Article{Bayer:1973:M, 10053 author = "G. Bayer", 10054 title = "Maxflow", 10055 journal = j-CACM, 10056 volume = "16", 10057 number = "5", 10058 pages = "309--309", 10059 month = may, 10060 year = "1973", 10061 CODEN = "CACMA2", 10062 ISSN = "0001-0782", 10063 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10064 acknowledgement = ack-nhfb, 10065 classcodes = "C7300 (Natural sciences computing)", 10066 corpsource = "Tech. Univ., Braunschweig, West Germany", 10067 keywords = "arcs; flows; input parameters; maxflow; network; network analysis", 10068 treatment = "T Theoretical or Mathematical", 10069} 10070 10071@Article{Holmgren:1973:MAL, 10072 author = "B. Holmgren and A. Kolm and D. Obradovic", 10073 title = "Minit algorithm for linear programming", 10074 journal = j-CACM, 10075 volume = "16", 10076 number = "5", 10077 pages = "310--310", 10078 month = may, 10079 year = "1973", 10080 CODEN = "CACMA2", 10081 ISSN = "0001-0782", 10082 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10083 acknowledgement = ack-nhfb, 10084 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C7310 (Mathematics computing)", 10085 corpsource = "ASEA, Vasteras, Sweden", 10086 keywords = "linear programming; minit algorithm", 10087 treatment = "T Theoretical or Mathematical", 10088} 10089 10090@Article{Obradovic:1973:MAL, 10091 author = "D. Obradovic", 10092 title = "Minit algorithm for linear programming", 10093 journal = j-CACM, 10094 volume = "16", 10095 number = "5", 10096 pages = "310--310", 10097 month = may, 10098 year = "1973", 10099 CODEN = "CACMA2", 10100 ISSN = "0001-0782", 10101 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10102 acknowledgement = ack-nhfb, 10103 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C7310 (Mathematics computing)", 10104 corpsource = "Boris Kidric Inst. Nuclear Sci., Beograd, Yugoslavia", 10105 keywords = "linear programming; mini algorithm", 10106 treatment = "P Practical", 10107} 10108 10109@Article{Howell:1973:ESL, 10110 author = "J. A. Howell", 10111 title = "Exact solution of linear equations using residue arithmetic", 10112 journal = j-CACM, 10113 volume = "16", 10114 number = "5", 10115 pages = "311--311", 10116 month = may, 10117 year = "1973", 10118 CODEN = "CACMA2", 10119 ISSN = "0001-0782", 10120 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10121 acknowledgement = ack-nhfb, 10122 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C5230 (Digital arithmetic methods); C7310 (Mathematics computing)", 10123 corpsource = "Yale Univ., New Haven, CT, USA", 10124 keywords = "digital arithmetic; exact solution; inversion; linear algebra; linear equations; matrix; mixed radix conversion; modulus; prime number; residue arithmetic", 10125 treatment = "P Practical", 10126} 10127 10128@Article{Sale:1973:SMP, 10129 author = "A. H. J. Sale", 10130 title = "A sparse matrix package", 10131 journal = j-CACM, 10132 volume = "16", 10133 number = "5", 10134 pages = "311--311", 10135 month = may, 10136 year = "1973", 10137 CODEN = "CACMA2", 10138 ISSN = "0001-0782", 10139 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10140 acknowledgement = ack-nhfb, 10141 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C7310 (Mathematics computing)", 10142 corpsource = "Univ. Sydney, NSW, Australia", 10143 keywords = "algorithm; matrix algebra; sparse matrix package", 10144 treatment = "P Practical", 10145} 10146 10147@Article{Wheeler:1973:IEQ, 10148 author = "R. E. Wheeler", 10149 title = "Increasing the efficiency of quicksort", 10150 journal = j-CACM, 10151 volume = "16", 10152 number = "5", 10153 pages = "311--311", 10154 month = may, 10155 year = "1973", 10156 CODEN = "CACMA2", 10157 ISSN = "0001-0782", 10158 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10159 acknowledgement = ack-nhfb, 10160 classcodes = "C6130 (Data handling techniques)", 10161 corpsource = "E. I. du Pont Nemours and Co., Wilmington, DE, USA", 10162 keywords = "efficiency; quicksort; sorting", 10163 treatment = "P Practical", 10164} 10165 10166@Article{Roy:1973:RPR, 10167 author = "M. K. Roy", 10168 title = "Reflection-free permutations, rosary permutations and adjacent transposition algorithms", 10169 journal = j-CACM, 10170 volume = "16", 10171 number = "5", 10172 pages = "312--312", 10173 month = may, 10174 year = "1973", 10175 CODEN = "CACMA2", 10176 ISSN = "0001-0782", 10177 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10178 acknowledgement = ack-nhfb, 10179 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics)", 10180 corpsource = "Jadavpur Univ., Calcutta, India", 10181 keywords = "adjacent transposition algorithms; combinatorial analysis; combinatorial mathematics; permutation; reflection free; rosary", 10182 treatment = "T Theoretical or Mathematical", 10183} 10184 10185@Article{McMorrow:1973:CMC, 10186 author = "C. H. McMorrow", 10187 title = "Concerning music and computer composition in computational linguistics", 10188 journal = j-CACM, 10189 volume = "16", 10190 number = "5", 10191 pages = "313--313", 10192 month = may, 10193 year = "1973", 10194 CODEN = "CACMA2", 10195 ISSN = "0001-0782", 10196 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10197 acknowledgement = ack-nhfb, 10198 classcodes = "C7820 (Humanities computing)", 10199 corpsource = "Eagle Signal Corp., Davenport, IA, USA", 10200 keywords = "computational linguistics; computer composition; humanities; music", 10201 treatment = "G General Review", 10202} 10203 10204@Article{Wexelblat:1973:ACC, 10205 author = "R. L. Wexelblat", 10206 title = "Another comment on computer music", 10207 journal = j-CACM, 10208 volume = "16", 10209 number = "5", 10210 pages = "313--314", 10211 month = may, 10212 year = "1973", 10213 CODEN = "CACMA2", 10214 ISSN = "0001-0782", 10215 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10216 acknowledgement = ack-nhfb, 10217 classcodes = "C7820 (Humanities computing)", 10218 corpsource = "Bell Labs., Holmdel, NJ, USA", 10219 keywords = "composer; computer music; humanities; musical taste; value judgment", 10220 treatment = "G General Review", 10221} 10222 10223@Article{Estell:1973:CPA, 10224 author = "R. G. Estell", 10225 title = "A comment on the practical aspects of computer science education", 10226 journal = j-CACM, 10227 volume = "16", 10228 number = "5", 10229 pages = "314--315", 10230 month = may, 10231 year = "1973", 10232 CODEN = "CACMA2", 10233 ISSN = "0001-0782", 10234 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10235 acknowledgement = ack-nhfb, 10236 classcodes = "C0220 (Computing education and training)", 10237 keywords = "computer science education; curriculum; digital computers; education", 10238 treatment = "G General Review; P Practical", 10239} 10240 10241@Article{Fajman:1973:WIT, 10242 author = "Roger Fajman and John Borgelt", 10243 title = "{WYLBUR}, An Interactive Text Editing and Remote Job Entry System", 10244 journal = j-CACM, 10245 volume = "16", 10246 number = "5", 10247 pages = "314--322", 10248 month = may, 10249 year = "1973", 10250 CODEN = "CACMA2", 10251 ISSN = "0001-0782", 10252 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10253 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib", 10254 abstract = "WYLBUR is a comprehensive system for manipulating all kinds of text, such as computer programs, letters, and manuscripts, using typewriter terminals connected to a computer. It has facilities for remote job entry and retrieval as well as facilities for text alignment and justification. A powerful method for addressing text by content is provided. This paper describes the external appearance of WYLBUR as well as its internal structure. A short description of the major features of ORVYL, a general purpose time-sharing system which operates in conjunction with WYLBUR, is also included.", 10255 acknowledgement = ack-nhfb, 10256 classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", 10257 classification = "723", 10258 corpsource = "Stanford Univ., CA, USA", 10259 journalabr = "Commun ACM", 10260 keywords = "addressing; computer systems programming; content; content addressing; data entry; data handling; data processing; document preparation; interactive text editing; ORVYL; remote; remote job entry; remote job retrieval; terminal; text editing", 10261 treatment = "P Practical", 10262} 10263 10264@Article{Frailey:1973:PAM, 10265 author = "Dennis J. Frailey", 10266 title = "A Practical Approach to Managing Resources and Avoiding Deadlocks", 10267 journal = j-CACM, 10268 volume = "16", 10269 number = "5", 10270 pages = "323--329", 10271 month = may, 10272 year = "1973", 10273 CODEN = "CACMA2", 10274 ISSN = "0001-0782", 10275 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10276 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 10277 abstract = "Resource scheduling and allocation can be expensive with regard to time and space in multiprogramming or time-sharing environments involving large numbers of tasks and resources with conflicting requirements. \par Detection and\slash or prevention of deadlocks can require massive amounts of additional overhead if efficient usage of resources is to be maintained. A resource management program is described which uses linked lists along with other techniques to overcome a large portion of this overhead. The program, which is currently running as part of a large scale general purpose operating system, keeps resources relatively active but does not detect or prevent all deadlocks in its implemented state. Certain changes, which would permit more comprehensive levels of deadlock prevention\slash detection at additional cost, have not been incorporated in the running system due to the infrequency of deadlock situations.", 10278 acknowledgement = ack-nhfb, 10279 annote = "Description of a limited implementation and good overview.", 10280 classcodes = "C6150J (Operating systems)", 10281 classification = "723", 10282 corpsource = "Southern Methodist Univ., Dallas, TX, USA", 10283 journalabr = "Commun ACM", 10284 keywords = "(computers); allocation; computer systems programming; deadlock; deadly embrace; file organisation; multiprocessing; multiprogramming; operating systems; resource; resource allocation; resource management; resource scheduling; scheduling; storage allocation; time sharing; time-sharing; time-sharing programs", 10285 treatment = "P Practical", 10286} 10287 10288@Article{Hamlet:1973:EMR, 10289 author = "R. G. Hamlet", 10290 title = "Efficient multiprogramming resource allocation and accounting", 10291 journal = j-CACM, 10292 volume = "16", 10293 number = "6", 10294 pages = "337--342", 10295 month = jun, 10296 year = "1973", 10297 CODEN = "CACMA2", 10298 ISSN = "0001-0782", 10299 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10300 acknowledgement = ack-nhfb, 10301 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 10302 corpsource = "Univ. Maryland, Baltimore, MD, USA", 10303 keywords = "accounting; efficient; executive; memory; monitor; multiprogramming; resource allocation; storage allocation", 10304 treatment = "P Practical", 10305} 10306 10307@Article{Gelenbe:1973:MWS, 10308 author = "E. Gelenbe and J. C. A. Boekhorst and J. L. W. Kessels", 10309 title = "Minimizing wasted space in partitioned segmentation", 10310 journal = j-CACM, 10311 volume = "16", 10312 number = "6", 10313 pages = "343--349", 10314 month = jun, 10315 year = "1973", 10316 CODEN = "CACMA2", 10317 ISSN = "0001-0782", 10318 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10319 acknowledgement = ack-nhfb, 10320 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 10321 corpsource = "Univ. Michigan, Ann Arbor, MI, USA", 10322 keywords = "algorithms; dynamic storage allocation; file organisation; fragmentation; multiple; page sizes; paged virtual memory; partitioned segmentation; storage allocation; storage management; system; wasted space", 10323 treatment = "P Practical", 10324} 10325 10326@Article{Hill:1973:SPM, 10327 author = "J. C. Hill", 10328 title = "Synchronizing processors with memory-content-generated interrupts", 10329 journal = j-CACM, 10330 volume = "16", 10331 number = "6", 10332 pages = "350--351", 10333 month = jun, 10334 year = "1973", 10335 CODEN = "CACMA2", 10336 ISSN = "0001-0782", 10337 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10338 acknowledgement = ack-nhfb, 10339 classcodes = "C6150J (Operating systems)", 10340 corpsource = "Univ. California, Livermore, CA, USA", 10341 keywords = "associative memories; debugging; interrupts; microprogramming; monitors; multiprocessing programs; multiprocessor; parallel processing; supervisors; synchronisation; synchronizing processors", 10342 treatment = "P Practical", 10343} 10344 10345@Article{Stone:1973:NOS, 10346 author = "Harold S. Stone and Samuel F. Fuller", 10347 title = "On the Near-Optimality of the Shortest-Latency-Time-First Drum Scheduling Discipline", 10348 journal = j-CACM, 10349 volume = "16", 10350 number = "6", 10351 pages = "352--353", 10352 month = jun, 10353 year = "1973", 10354 CODEN = "CACMA2", 10355 ISSN = "0001-0782", 10356 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10357 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 10358 note = "Also published in/as: Technical Note No.12, DSL.", 10359 acknowledgement = ack-nhfb, 10360 classcodes = "C6120 (File organisation)", 10361 corpsource = "Stanford Univ., CA, USA", 10362 keywords = "computer systems; drum scheduling discipline; file organisation; latency scheduling; minimal; shortest latency time first; storage allocation; storage management", 10363 treatment = "T Theoretical or Mathematical", 10364} 10365 10366@Article{Stockhausen:1973:AOC, 10367 author = "P. F. Stockhausen", 10368 title = "Adapting optimal code generation for arithmetic expressions to the instruction sets available on present-day computers", 10369 journal = j-CACM, 10370 volume = "16", 10371 number = "6", 10372 pages = "353--354", 10373 month = jun, 10374 year = "1973", 10375 CODEN = "CACMA2", 10376 ISSN = "0001-0782", 10377 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10378 acknowledgement = ack-nhfb, 10379 classcodes = "C5230 (Digital arithmetic methods)", 10380 corpsource = "Bell Labs., Murray Hill., NJ, USA", 10381 keywords = "arithmetic expressions; codes; digital arithmetic; instruction; optimal code generation; sets", 10382 treatment = "P Practical", 10383} 10384 10385@Article{Ling:1973:CGA, 10386 author = "R. F. Ling", 10387 title = "A computer generated aid for cluster analysis", 10388 journal = j-CACM, 10389 volume = "16", 10390 number = "6", 10391 pages = "355--361", 10392 month = jun, 10393 year = "1973", 10394 CODEN = "CACMA2", 10395 ISSN = "0001-0782", 10396 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10397 acknowledgement = ack-nhfb, 10398 classcodes = "C5530 (Pattern recognition and computer vision equipment); C5540 (Terminals and graphic displays)", 10399 corpsource = "Univ. Chicago, IL, USA", 10400 keywords = "cluster analysis; computer aided analysis; computer graphics; factor analysis; hierarchical clustering; numerical taxonomy; pattern; recognition", 10401 treatment = "P Practical", 10402} 10403 10404@Article{Shneiderman:1973:ODB, 10405 author = "Ben Shneiderman", 10406 title = "Optimum Data Base Reorganization Points", 10407 journal = j-CACM, 10408 volume = "16", 10409 number = "6", 10410 pages = "362--365", 10411 month = jun, 10412 year = "1973", 10413 CODEN = "CACMA2", 10414 ISSN = "0001-0782", 10415 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10416 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 10417 acknowledgement = ack-nhfb, 10418 annote = "Criteria for file reorganization", 10419 classcodes = "C6120 (File organisation)", 10420 corpsource = "State Univ. New York, Stony Brook, NY, USA", 10421 keywords = "cost per access; data base; file organisation; files; information retrieval; optimum; reorganization; strategies", 10422 treatment = "P Practical", 10423} 10424 10425@Article{Strunz:1973:DDT, 10426 author = "H. Strunz", 10427 title = "The development of decision tables via parsing of complex decision situations", 10428 journal = j-CACM, 10429 volume = "16", 10430 number = "6", 10431 pages = "366--369", 10432 month = jun, 10433 year = "1973", 10434 CODEN = "CACMA2", 10435 ISSN = "0001-0782", 10436 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10437 acknowledgement = ack-nhfb, 10438 classcodes = "C6110 (Systems analysis and programming)", 10439 corpsource = "Mathematischer Beratungs- and Programmierungsdienst GmbH, Cologne, West Germany", 10440 keywords = "decision grid chart; decision tables; development; parsing; problem analysis", 10441 treatment = "P Practical", 10442} 10443 10444@Article{Bell:1973:TC, 10445 author = "James R. Bell", 10446 title = "Threaded Code", 10447 journal = j-CACM, 10448 volume = "16", 10449 number = "6", 10450 pages = "370--372", 10451 month = jun, 10452 year = "1973", 10453 CODEN = "CACMA2", 10454 ISSN = "0001-0782", 10455 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10456 abstract = "The concept of ``threaded code'' is presented as an alternative to machine language code. Hardware and software realizations of it are given. In software it is realized as interpretive code not needing an interpreter. Extensions and optimizations are mentioned.", 10457 acknowledgement = ack-nhfb, 10458 classcodes = "C5220 (Computer architecture); C6110 (Systems analysis and programming); C6140B (Machine-oriented languages)", 10459 corpsource = "Digital Equipment Corp., Maynard, MA, USA", 10460 keywords = "code; compiled code; hardware; interpreter; machine; machine code; machine oriented languages; microprogramming; programming; software; space tradeoff; subroutine calls; threaded code; time tradeoff", 10461 treatment = "P Practical", 10462} 10463 10464@Article{Hopcroft:1973:AAE, 10465 author = "J. Hopcroft and R. Tarjan", 10466 title = "{ACM} Algorithm 447: Efficient Algorithms for Graph Manipulation", 10467 journal = j-CACM, 10468 volume = "16", 10469 number = "6", 10470 pages = "372--378", 10471 month = jun, 10472 year = "1973", 10473 CODEN = "CACMA2", 10474 ISSN = "0001-0782", 10475 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10476 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 10477 acknowledgement = ack-nhfb, 10478 classcodes = "C7310 (Mathematics computing)", 10479 corpsource = "Cornell Univ., Ithaca, NY, USA", 10480 keywords = "ALGOL; algorithms; graph manipulation; graph theory; mathematics; partitioning; subroutines", 10481 treatment = "P Practical", 10482} 10483 10484@Article{Beyer:1973:AAN, 10485 author = "T. Beyer and D. F. Swinehart", 10486 title = "{ACM} Algorithm 448: Number of Multiply-Restricted Partitions", 10487 journal = j-CACM, 10488 volume = "16", 10489 number = "6", 10490 pages = "379--379", 10491 month = jun, 10492 year = "1973", 10493 CODEN = "CACMA2", 10494 ISSN = "0001-0782", 10495 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10496 acknowledgement = ack-nhfb, 10497 classcodes = "C5230 (Digital arithmetic methods)", 10498 corpsource = "Univ. Oregon, Eugene, OR, USA", 10499 keywords = "change making; digital arithmetic; enumeration; FORTRAN; multiply restricted partitions; positive integer; subroutine; subroutines", 10500 treatment = "P Practical", 10501} 10502 10503@Article{Ferguson:1973:LSP, 10504 author = "J. Ferguson and P. A. Staley", 10505 title = "Least squares piecewise cubic curve fitting", 10506 journal = j-CACM, 10507 volume = "16", 10508 number = "6", 10509 pages = "380--382", 10510 month = jun, 10511 year = "1973", 10512 CODEN = "CACMA2", 10513 ISSN = "0001-0782", 10514 MRclass = "65D10", 10515 MRnumber = "50 15267", 10516 mrreviewer = "Bernard H. Rosman", 10517 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10518 abstract = "The matrices involved in a linear least squares formulation are determined for the problem of fitting piecewise cubic functions, those possessing a continuous derivative, to arrays of planar data.", 10519 acknowledgement = ack-nhfb, 10520 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation)", 10521 corpsource = "Teledyne Ryan Aeronaut. Co., San Diego, CA, USA", 10522 keywords = "approximation splines; curve fitting; data; data reduction; data reduction and analysis; function approximation; least; least squares; piecewise cubic; reduction; squares approximations", 10523 treatment = "T Theoretical or Mathematical", 10524} 10525 10526@Article{Hoskins:1973:CSS, 10527 author = "W. D. Hoskins", 10528 title = "Cubic spline solutions to fourth-order boundary value problems", 10529 journal = j-CACM, 10530 volume = "16", 10531 number = "6", 10532 pages = "382--385", 10533 month = jun, 10534 year = "1973", 10535 CODEN = "CACMA2", 10536 ISSN = "0001-0782", 10537 MRclass = "65L10", 10538 MRnumber = "58 31861", 10539 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10540 abstract = "The cubic spline approximation to the fourth-order differential equation $y''''+p(x)y''+q(x)y'+r(x)y=t(x)$ is shown to reduce to the solution of a five-term recurrence relationship. For some special cases the approximation is shown to be simply related to a finite difference representation with a local truncation error of order $(y/720)\delta^8$.", 10541 acknowledgement = ack-nhfb, 10542 classcodes = "B0290F (Interpolation and function approximation); B0290P (Differential equations); C4130 (Interpolation and function approximation); C4170 (Differential equations)", 10543 corpsource = "Univ. Manitoba, Winnipeg, Man., Canada", 10544 keywords = "(mathematics); boundary value problem; boundary value problems; boundary-value problems; cubic spline; differential; differential equations; equations; fourth order; splines", 10545 treatment = "T Theoretical or Mathematical", 10546} 10547 10548@Article{Alt:1973:CPT, 10549 author = "Franz L. Alt and Judith Yuni Kirk", 10550 title = "Computer Photocomposition of Technical Text", 10551 journal = j-CACM, 10552 volume = "16", 10553 number = "6", 10554 pages = "386--391", 10555 month = jun, 10556 year = "1973", 10557 CODEN = "CACMA2", 10558 ISSN = "0001-0782", 10559 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10560 note = "Describes the typesetting system used by the American Institute of Physics.", 10561 abstract = "In computer assisted typesetting by means of photocomposition, special problems arise in highly technical material such as mathematical formulas. New solutions to several of these problems have been devised in the information system of the American Institute of Physics. They include: the representation of special characters (foreign alphabets, mathematical symbols, etc.) not available on input keyboards or on the photocomposer; the generation of such symbols, e.g. by overprinting; the precise positioning of accent marks (floating diacritics); line breaks, i.e. words or formulas placed partly at the end of one line and partly at the beginning of the next; and certain aspects of error correction.", 10562 acknowledgement = ack-nhfb, 10563 classcodes = "C7230 (Publishing and reproduction)", 10564 corpsource = "American Inst. Phys., New York, NY, USA", 10565 keywords = "computer; computer controlled typesetting; graphics; photocomposition; printing; technical text; text processing; typesetting", 10566 treatment = "P Practical", 10567} 10568 10569@Article{Nolan:1973:MCR, 10570 author = "Richard L. Nolan", 10571 title = "Managing the Computer Resource: Stage Hypothesis", 10572 journal = j-CACM, 10573 volume = "16", 10574 number = "7", 10575 pages = "399--405", 10576 month = jul, 10577 year = "1973", 10578 CODEN = "CACMA2", 10579 ISSN = "0001-0782", 10580 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10581 bibsource = "Compendex database", 10582 abstract = "Based on the study of expenditures for data processing, a descriptive stage hypothesis is presented. It is suggested that the planning, organizing, and controlling activities associated with managing the computer resource will change in character over a period of time, and will evolve in patterns roughly correlated to four stages of the computer budget: Stage I (computer acquisition), Stage II (intense system development), Stage III (proliferation of controls), and Stage IV (user\slash service orientation). Each stage is described and related to individual tasks for managing the computer resource.", 10583 acknowledgement = ack-nhfb, 10584 classcodes = "C0310 (EDP management)", 10585 classification = "723", 10586 corpsource = "Harvard Univ. Cambridge, MA, USA", 10587 journalabr = "Commun ACM", 10588 keywords = "computer; computer budget; computer expenditures; computer management; computer resource; control; data processing; data processing, business; economics; management; organizing; planning; resource; stage hypothesis", 10589 treatment = "E Economic", 10590 xxtitle = "Managing the computer resource: a stage hypothesis", 10591} 10592 10593@Article{Huang:1973:NIO, 10594 author = "J. C. Huang", 10595 title = "A Note on Information Organization and Storage", 10596 journal = j-CACM, 10597 volume = "16", 10598 number = "7", 10599 pages = "406--410", 10600 month = jul, 10601 year = "1973", 10602 CODEN = "CACMA2", 10603 ISSN = "0001-0782", 10604 MRclass = "68A50", 10605 MRnumber = "55 13900", 10606 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10607 bibsource = "Compendex database", 10608 abstract = "Since the logical structure of a data base can be represented by a tree or graph, it is quite natural for us to view the process of designing a data base as that of constructing a tree or a graph. \par A general method for constructing such a tree or a graph is provided. There are three important elements in this general construction method; namely, a set of binary relations, an algorithm for constructing subsets of a set, and an algorithm for selecting an element from the given set of objects. The use of different relations and algorithms results in different information structures, as list, tree, ring, etc. Thus the problem of information organization and storage is reduced to that of defining relations and formulating algorithms under a given set of constraints. \par The results presented may be valuable to designers as useful design concepts, and may serve as a basis for developing a formal theory on the subject.", 10609 acknowledgement = ack-nhfb, 10610 classcodes = "C6120 (File organisation)", 10611 classification = "723; 901; 921", 10612 corpsource = "Univ. Houston, TX, USA", 10613 journalabr = "Commun ACM", 10614 keywords = "(mathematical); data base; data-base management; file organisation; file organization; graph; graph theory; information; information retrieval; information retrieval systems; information structure; management; mathematical techniques --- Graph Theory; storage allocation; structure; tree; trees", 10615 treatment = "T Theoretical or Mathematical", 10616} 10617 10618@Article{Kozdrowicki:1973:CIC, 10619 author = "Edward W. Kozdrowicki and Dennis W. Cooper", 10620 title = "{COKO III}: the {Cooper-Koz} Chess Program", 10621 journal = j-CACM, 10622 volume = "16", 10623 number = "7", 10624 pages = "411--427 (or 411--426??)", 10625 month = jul, 10626 year = "1973", 10627 CODEN = "CACMA2", 10628 ISSN = "0001-0782", 10629 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10630 bibsource = "Compendex database", 10631 abstract = "COKO III is a chess player written entirely in Fortran. On the IBM 360-65, COKO III plays a minimal chess game at the rate of. 2 sec cpu time per move, with a level close to lower chess club play. A selective tree searching procedure controlled by tactical chess logistics allows a deployment of multiple minimal game calculations to achieve some optimal move selection. In addition, an interesting phenomenon called a tree searching catastrophe has plagued COKO's entire development just as it troubles a human player. Standard exponential growth is curbed to a large extent by the definition and trimming of the Fischer set. Representation of the chess environment is described along with a strategic preanalysis procedure that maps the Lasker regions. Specific chess algorithms are described which could be used as a command structure by anyone desiring to do some chess program experimentation. A comparison is made of some mysterious actions of human players and COKO III.", 10632 acknowledgement = ack-nhfb, 10633 classcodes = "C1230 (Artificial intelligence); C7810 (Social and behavioural sciences computing)", 10634 classification = "723", 10635 corpsource = "Univ. California, Davis, CA, USA", 10636 journalabr = "Commun ACM", 10637 keywords = "artificial intelligence; chess program; COKO III; computer systems programming; FORTRAN; games of skill; heuristic programming; minimal chess game; selective searching; tree searching", 10638 treatment = "A Application", 10639} 10640 10641@Article{Howard:1973:MSD, 10642 author = "John H. {Howard, Jr.}", 10643 title = "Mixed Solutions for the Deadlock Problem", 10644 journal = j-CACM, 10645 volume = "16", 10646 number = "7", 10647 pages = "427--430", 10648 month = jul, 10649 year = "1973", 10650 CODEN = "CACMA2", 10651 ISSN = "0001-0782", 10652 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10653 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 10654 abstract = "Mixtures of detection, avoidance, and prevention provide more effective and practical solutions to the deadlock problem than any one of these alone. The individual techniques can be tailored for subproblems of resource allocation and still operate together to prevent deadlocks. This paper presents a method, based on the concept of the hierarchical operating system, for constructing appropriate mixtures and suggests appropriate subsystems for the most frequently occurring resource allocation problems.", 10655 acknowledgement = ack-nhfb, 10656 classcodes = "C6150J (Operating systems)", 10657 classification = "723", 10658 corpsource = "Univ. Texas, Austin, TX, USA", 10659 journalabr = "Commun ACM", 10660 keywords = "computer operating systems; computer systems programming --- Multiprogramming; deadlock problem; deadlocks; hierarchical systems; mixed solutions; multiprogramming; operating systems; operating systems (computers); resource allocation", 10661 treatment = "P Practical", 10662} 10663 10664@Article{Gelenbe:1973:DPP, 10665 author = "Erol Gelenbe", 10666 title = "Distribution of a Program in Primary and Fast Buffer Storage", 10667 journal = j-CACM, 10668 volume = "16", 10669 number = "7", 10670 pages = "431--434", 10671 month = jul, 10672 year = "1973", 10673 CODEN = "CACMA2", 10674 ISSN = "0001-0782", 10675 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10676 bibsource = "Compendex database", 10677 abstract = "A virtual memory computer system with a fast buffer (cache) memory between primary memory and central processing unit is considered. The optimal distribution of a program between the buffer and primary memory is studied using the program's lifetime function. Expressions for the distribution of a program which maximizes the useful fraction of the cost-time integral of primary and fast buffer storage are obtained for swapping and nonswapping buffer management policies.", 10678 acknowledgement = ack-nhfb, 10679 classcodes = "C6120 (File organisation)", 10680 classification = "723", 10681 journalabr = "Commun ACM", 10682 keywords = "cache; computer systems programming; cost time integral; distribution of a program; fast buffer; function; lifetime; lifetime function; storage; virtual memory; virtual memory computer system; virtual storage", 10683 treatment = "P Practical", 10684} 10685 10686@Article{Rosin:1973:TP, 10687 author = "Robert F. Rosin", 10688 title = "Teaching ``About Programming''", 10689 journal = j-CACM, 10690 volume = "16", 10691 number = "7", 10692 pages = "435--439", 10693 month = jul, 10694 year = "1973", 10695 CODEN = "CACMA2", 10696 ISSN = "0001-0782", 10697 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10698 bibsource = "Compendex database", 10699 abstract = "This paper presents the goals and organization of a course about programming designed to provide entering students in a graduate program with a cultural enrichment in their professional lives. The students are expected to have taken at least two programming courses prior to this one and, therefore, to be familiar with at least two programming languages, both as students and users. Teaching someone how to program is similar to teaching him to play a musical instrument: neither skill can be taught-they must be learned. However, the teacher still serves several vital purposes: to present a set of rules for producing well-formed utterances; to offer numerous demonstrations of his own skill; and to function as an involved critic. Finally, the teacher is the source of information about the process in which the student is involved.", 10700 acknowledgement = ack-nhfb, 10701 classcodes = "C0220 (Computing education and training); C6110 (Systems analysis and programming)", 10702 classification = "723", 10703 corpsource = "Univ. Aarhus, Denmark", 10704 journalabr = "Commun ACM", 10705 keywords = "computer systems programming; education; professionalism; programming; programming concepts; teaching", 10706} 10707 10708@Article{McFarlan:1973:CRG, 10709 author = "F. Warren McFarlan and Richard L. Nolan", 10710 title = "Curriculum Recommendations for Graduate Professional Programs in Information Systems: Recommended Addendum on Information Systems Administration", 10711 journal = j-CACM, 10712 volume = "16", 10713 number = "7", 10714 pages = "439--442 (or 439--441??)", 10715 month = jul, 10716 year = "1973", 10717 CODEN = "CACMA2", 10718 ISSN = "0001-0782", 10719 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10720 bibsource = "Compendex database", 10721 abstract = "An addendum to the Report of the ACM Curriculum Committee on Computer Education for Management is proposed. The proposed addendum is to include in the curriculum a course on Information Systems administration. It is important for two reasons: (1) the systems designer must understand the administrative framework in which he must operate to work effectively, and (2) an important objective of the curriculum recommendations is to prepare the future manager of the computer activity. \par It is felt that the importance of these two reasons justifies the addition of the recommended course. \par The course is outlined in the format of the original report.", 10722 acknowledgement = ack-nhfb, 10723 classcodes = "C0220 (Computing education and training); C0310 (EDP management); C7100 (Business and administration)", 10724 classification = "723; 901", 10725 corpsource = "Harvard Univ., Cambridge, MA, USA", 10726 journalabr = "Commun ACM", 10727 keywords = "administration; computer management; curriculum recommendations; education; information retrieval systems; information systems; information systems administration; information systems management; management; management information systems", 10728 treatment = "P Practical", 10729} 10730 10731@Article{Kandel:1973:CSS, 10732 author = "A. Kandel", 10733 title = "Computer Science --- Seminars for Undergraduates", 10734 journal = j-CACM, 10735 volume = "16", 10736 number = "7", 10737 pages = "442--442", 10738 month = jul, 10739 year = "1973", 10740 CODEN = "CACMA2", 10741 ISSN = "0001-0782", 10742 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10743 acknowledgement = ack-nhfb, 10744 classcodes = "C0220 (Computing education and training)", 10745 corpsource = "New Mexico Inst. Mining Technol., Soccorro., NM, USA", 10746 keywords = "computer science; curriculum; digital computers; education; seminars; undergraduates", 10747 keywords = "computer science; curriculum; education; fuzzy educational structure; imprecise synthesis", 10748 treatment = "G General Review; P Practical", 10749} 10750 10751@Article{Bochmann:1973:MEL, 10752 author = "G. V. Bochmann", 10753 title = "Multiple Exits from a Loop Without the {GOTO}", 10754 journal = j-CACM, 10755 volume = "16", 10756 number = "7", 10757 pages = "443--444", 10758 month = jul, 10759 year = "1973", 10760 CODEN = "CACMA2", 10761 ISSN = "0001-0782", 10762 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10763 acknowledgement = ack-nhfb, 10764 classcodes = "C6140 (Programming languages)", 10765 corpsource = "Univ. Montreal, Que., Canada", 10766 keywords = "control structures; exit statement; from loops; goto free programming; multiple exits; multiple exits from loops; programming languages", 10767 treatment = "P Practical", 10768} 10769 10770@Article{Hall:1973:EBA, 10771 author = "Patrick A. V. Hall", 10772 title = "Equivalence Between {AND\slash OR} Graphs and Context-Free Grammars", 10773 journal = j-CACM, 10774 volume = "16", 10775 number = "7", 10776 pages = "444--445", 10777 month = jul, 10778 year = "1973", 10779 CODEN = "CACMA2", 10780 ISSN = "0001-0782", 10781 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10782 acknowledgement = ack-nhfb, 10783 classcodes = "C1230 (Artificial intelligence); C4210 (Formal logic)", 10784 corpsource = "City Univ., London, UK", 10785 keywords = "AND/OR graphs; artificial intelligence; context free grammars; context-free grammars; equivalance; graph theory; language theory", 10786 treatment = "T Theoretical or Mathematical", 10787} 10788 10789@Article{Fiala:1973:AAS, 10790 author = "F. Fiala", 10791 title = "{ACM} Algorithm 449: Solution of Linear Programming Problems in 0-1 Variables", 10792 journal = j-CACM, 10793 volume = "16", 10794 number = "7", 10795 pages = "445--448 (or 445--447??)", 10796 month = jul, 10797 year = "1973", 10798 CODEN = "CACMA2", 10799 ISSN = "0001-0782", 10800 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10801 acknowledgement = ack-nhfb, 10802 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C7310 (Mathematics computing)", 10803 corpsource = "Univ. Alberta, Edmonton, Alta., Canada", 10804 keywords = "FORTRAN; linear programming; subroutine; subroutines; zero one programming", 10805 treatment = "P Practical", 10806} 10807 10808@Article{Kernighan:1973:RAM, 10809 author = "B. W. Kernighan", 10810 title = "Remark on {``Algorithm 422: Minimal Spanning Tree''}", 10811 journal = j-CACM, 10812 volume = "16", 10813 number = "7", 10814 pages = "448--448", 10815 month = jul, 10816 year = "1973", 10817 CODEN = "CACMA2", 10818 ISSN = "0001-0782", 10819 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10820 note = "See \cite{Whitney:1972:AAM}.", 10821 acknowledgement = ack-nhfb, 10822 classcodes = "C7310 (Mathematics computing)", 10823 corpsource = "Bell Telephone Labs. Inc., Murray Hill, NJ, USA", 10824 keywords = "minimal spanning tree; subroutine; trees (mathematical)", 10825 keywords = "minimal spanning tree; Prim algorithm; spanning tree", 10826} 10827 10828@Article{Macleod:1973:HPP, 10829 author = "I. D. G. Macleod and A. M. Collins", 10830 title = "Hidden-line plotting program", 10831 journal = j-CACM, 10832 volume = "16", 10833 number = "7", 10834 pages = "448--448", 10835 month = jul, 10836 year = "1973", 10837 CODEN = "CACMA2", 10838 ISSN = "0001-0782", 10839 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10840 acknowledgement = ack-nhfb, 10841 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques)", 10842 corpsource = "Australian Nat. Univ., Canberra, Australia", 10843 keywords = "computer graphics; data handling; hidden line; surface plot", 10844 treatment = "P Practical", 10845} 10846 10847@Article{Nikolai:1973:DSO, 10848 author = "P. J. Nikolai", 10849 title = "{DIFSUB} for solution of ordinary differential equations", 10850 journal = j-CACM, 10851 volume = "16", 10852 number = "7", 10853 pages = "448--448", 10854 month = jul, 10855 year = "1973", 10856 CODEN = "CACMA2", 10857 ISSN = "0001-0782", 10858 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10859 acknowledgement = ack-nhfb, 10860 classcodes = "B0290P (Differential equations); C4170 (Differential equations); C7310 (Mathematics computing)", 10861 corpsource = "Wright-Patterson Air Force Base, OH, USA", 10862 keywords = "boundary value; certification; differential equations; DIFSUB; ordinary differential equations; problems", 10863 treatment = "P Practical", 10864} 10865 10866@Article{Smith:1973:LPW, 10867 author = "Michael H. Smith", 10868 title = "A learning program which plays partnership dominoes", 10869 journal = j-CACM, 10870 volume = "16", 10871 number = "8", 10872 pages = "462--467", 10873 month = aug, 10874 year = "1973", 10875 CODEN = "CACMA2", 10876 ISSN = "0001-0782", 10877 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10878 bibsource = "Compendex database", 10879 abstract = "A learning program has been written in BASIC to play four-player partnership dominoes. Because dominoes is a game of incomplete information, the program uses somewhat different principles of artificial intelligence from those used in programs for games of complete information, such as checkers, chess, and go. The program was constructed to use a ``strategy signature table'' which classifies board situations through the interactions of game parameters. Each entry in the table contains adaptively determined weights indicating the advisability of various strategies. Once chosen, a strategy then employs probability analysis and linear polynomial evaluation to choose a move. Our program wins approximately two-thirds of its games in tournament situations, and has defeated championship players.", 10880 acknowledgement = ack-nhfb, 10881 classcodes = "C1230 (Artificial intelligence); C7890 (Other special applications of computing)", 10882 classification = "461; 912", 10883 corpsource = "Univ. California, Berkeley, CA, USA", 10884 journalabr = "Commun ACM", 10885 keywords = "artificial intelligence; BASIC; game playing; games of skill; heuristic; intelligence; learning program; learning: heuristic procedures; partnership dominoes; problem; programming; solving; systems science and cybernetics", 10886 treatment = "P Practical", 10887} 10888 10889@Article{MacLennan:1973:FAB, 10890 author = "B. J. MacLennan", 10891 title = "{Fen} --- an Axiomatic Basis for Program Semantics", 10892 journal = j-CACM, 10893 volume = "16", 10894 number = "8", 10895 pages = "468--474", 10896 month = aug, 10897 year = "1973", 10898 CODEN = "CACMA2", 10899 ISSN = "0001-0782", 10900 MRclass = "68A05 (02G99)", 10901 MRnumber = "51 9561", 10902 mrreviewer = "W. D. Maurer", 10903 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10904 bibsource = "Compendex database", 10905 abstract = "The notions of data item, function, and relation. It is argued that the system is more suitable than set theory (or its derivatives) for the concise and accurate description of program semantics. It is shown how the system can be used to build composite data types out of simper ones with the operations of rowing, structuring, and uniting. It is also demonstrated that completely new primitive types can be introduced into languages through the mechanism of singleton data types. Both deterministic and nondeterministic functions are shown to be definable in the system. \par It is described how the local environment can be modeled as a data item and how imperative statements can be considered functions on the environment. The nature of recursive functions is briefly discussed, and a technique is presented by which they can be introduced into the system. The technique is contrasted with the use of the paradoxical combinator, Y. The questions of local and global environments and of various modes of function calling and parameter passing are touched upon. The theory is applied to the proof of several elementary theorems concerning the semantics of the assignment, conditional, and iterative statements. An appendix is included which presents in detail the formal system governing webs and fen, the abstractions used informally in the body of the paper.", 10906 abstract2 = "A formal system is presented which abstracts the notions of data item, function, and relation. It is shown how the system can be used to build composite data types out of simpler ones with the operations of rowing, structuring, and uniting. It is also demonstrated that completely new primitive types can be introduced into languages through the mechanism of singleton data types. Both deterministic and nondeterministic functions are shown to be definable in the system. It is described how the local environment can be modeled as a data item and how imperative statements can be considered functions on the environment. The nature of recursive functions is briefly discussed, and a technique is presented by which they can be introduced into the system.", 10907 acknowledgement = ack-nhfb, 10908 classcodes = "C4210 (Formal logic)", 10909 classification = "723", 10910 corpsource = "Florida State Univ., Tallahassee, FL, USA", 10911 journalabr = "Commun ACM", 10912 keywords = "axioms; computer metatheory; correctness; data; data structures; data types; definition; description languages; extensible languages; fen; formal description; formal language; formal language definition; formal languages; formal systems; lambda-calculus; models of computation; modes; semantics; types", 10913 treatment = "T Theoretical or Mathematical", 10914} 10915 10916@Article{Misunas:1973:PNS, 10917 author = "David Misunas", 10918 title = "Petri Nets and Speed Independent Design", 10919 journal = j-CACM, 10920 volume = "16", 10921 number = "8", 10922 pages = "474--482 (or 474--481??)", 10923 month = aug, 10924 year = "1973", 10925 CODEN = "CACMA2", 10926 ISSN = "0001-0782", 10927 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10928 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/async.circuits.bib", 10929 abstract = "Petri nets are investigated as one method of modeling speed independent asynchronous circuits. A study of circuit realization of Petri nets leads to a demonstration of their usefulness in modeling speed independent operation. This usefulness is emphasized by the design of a speed independent processor from modules developed in the investigation of Petri net implementation.", 10930 acknowledgement = ack-nhfb, 10931 classcodes = "C4230D (Sequential switching theory); C5210 (Logic design methods)", 10932 classification = "721; 723", 10933 corpsource = "MIT, Cambridge, MA, USA", 10934 journalabr = "Commun ACM", 10935 keywords = "asynchronous circuits; asynchronous sequential logic; design; logic design; Petri nets; speed independent", 10936 treatment = "T Theoretical or Mathematical", 10937} 10938 10939@Article{MacHura:1973:AAR, 10940 author = "M. MacHura and A. Mulawa", 10941 title = "{ACM} Algorithm 450: {Rosenbrock} Function Minimization", 10942 journal = j-CACM, 10943 volume = "16", 10944 number = "8", 10945 pages = "482--483", 10946 month = aug, 10947 year = "1973", 10948 CODEN = "CACMA2", 10949 ISSN = "0001-0782", 10950 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10951 note = "See also \cite{Davies:1976:RRF}.", 10952 acknowledgement = ack-nhfb, 10953 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C7310 (Mathematics computing)", 10954 corpsource = "Inst. Automation and Measurements, Warsaw, Poland", 10955 keywords = "direct search; FORTRAN; function minimization; minimisation; Rosenbrock; subroutine; subroutines; unconstrained problem", 10956 treatment = "P Practical", 10957} 10958 10959@Article{Goldstein:1973:AAC, 10960 author = "R. B. Goldstein", 10961 title = "{ACM} Algorithm 451: Chi-Square Quantiles", 10962 journal = j-CACM, 10963 volume = "16", 10964 number = "8", 10965 pages = "483--485", 10966 month = aug, 10967 year = "1973", 10968 CODEN = "CACMA2", 10969 ISSN = "0001-0782", 10970 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10971 acknowledgement = ack-nhfb, 10972 classcodes = "C7310 (Mathematics computing)", 10973 corpsource = "Providence Coll., RI, USA", 10974 keywords = "Chi square quantiles; probability; statistic; statistics; subroutines", 10975 treatment = "P Practical", 10976} 10977 10978@Article{Liu:1973:AAE, 10979 author = "C. N. Liu and D. T. Tang", 10980 title = "{ACM} Algorithm 452: Enumerating Combinations of $m$ Out of $n$ Objects", 10981 journal = j-CACM, 10982 volume = "16", 10983 number = "8", 10984 pages = "485--485", 10985 month = aug, 10986 year = "1973", 10987 CODEN = "CACMA2", 10988 ISSN = "0001-0782", 10989 bibdate = "Tue Mar 25 13:26:09 MST 1997", 10990 acknowledgement = ack-nhfb, 10991 classcodes = "C7310 (Mathematics computing)", 10992 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 10993 keywords = "combinations; FORTRAN; NXCBN; permutations; statistics; subroutines", 10994 treatment = "P Practical", 10995} 10996 10997@Article{Piessens:1973:AAG, 10998 author = "Robert Piessens", 10999 title = "{ACM} Algorithm 453: {Gaussian} Quadrature Formulas for {Bromwich}'s Integral", 11000 journal = j-CACM, 11001 volume = "16", 11002 number = "8", 11003 pages = "486--487", 11004 month = aug, 11005 year = "1973", 11006 CODEN = "CACMA2", 11007 ISSN = "0001-0782", 11008 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11009 acknowledgement = ack-nhfb, 11010 classcodes = "B0290M (Numerical integration and differentiation); C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 11011 corpsource = "Univ. Leuven, Heverlee, Belgium", 11012 keywords = "BROMIN; Bromwich's integral; complex; FORTRAN; Gaussian quadrature formulas; integration; Laplace transform; Laplace transforms; numerical inversion; subroutines", 11013 treatment = "P Practical", 11014} 11015 11016@Article{Richardson:1973:AAC, 11017 author = "J. A. Richardson and J. L. Kuester", 11018 title = "{ACM} Algorithm 454: The Complex Method for Constrained Optimization", 11019 journal = j-CACM, 11020 volume = "16", 11021 number = "8", 11022 pages = "487--489", 11023 month = aug, 11024 year = "1973", 11025 CODEN = "CACMA2", 11026 ISSN = "0001-0782", 11027 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11028 acknowledgement = ack-nhfb, 11029 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C7310 (Mathematics computing)", 11030 corpsource = "Arizona State Univ., Tempe, AZ, USA", 11031 keywords = "Box's algorithm; complex method; constrained optimization; FORTRAN; maximum; multivariable; nonlinear function; optimisation; subroutines", 11032 treatment = "P Practical", 11033} 11034 11035@Article{Andrejkova:1973:CGF, 11036 author = "G. Andrejkova and J. Vinar", 11037 title = "Complex gamma function", 11038 journal = j-CACM, 11039 volume = "16", 11040 number = "8", 11041 pages = "489--489", 11042 month = aug, 11043 year = "1973", 11044 CODEN = "CACMA2", 11045 ISSN = "0001-0782", 11046 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11047 acknowledgement = ack-nhfb, 11048 classcodes = "C7310 (Mathematics computing)", 11049 corpsource = "Safarik Univ., Kosice, Czechoslovakia", 11050 keywords = "algorithm; certification; comment; complex gamma function; functions", 11051 treatment = "P Practical", 11052} 11053 11054@Article{DeMorgan:1973:RAA, 11055 author = "R. M. {De Morgan}", 11056 title = "Remark on {``Algorithm 357 [A1]: An Efficient Prime Number Generator''}", 11057 journal = j-CACM, 11058 volume = "16", 11059 number = "8", 11060 pages = "489--489", 11061 month = aug, 11062 year = "1973", 11063 CODEN = "CACMA2", 11064 ISSN = "0001-0782", 11065 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11066 acknowledgement = ack-nhfb, 11067 classcodes = "C7310 (Mathematics computing)", 11068 corpsource = "Digital Equipment Co. Ltd., Reading, UK", 11069 keywords = "algorithm; mathematics; prime number generator", 11070 treatment = "P Practical", 11071} 11072 11073@Article{Watkins:1973:GP, 11074 author = "R. P. Watkins", 11075 title = "Graph plotter", 11076 journal = j-CACM, 11077 volume = "16", 11078 number = "8", 11079 pages = "489--490", 11080 month = aug, 11081 year = "1973", 11082 CODEN = "CACMA2", 11083 ISSN = "0001-0782", 11084 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11085 acknowledgement = ack-nhfb, 11086 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques)", 11087 corpsource = "Royal Melbourne Inst. Technol., Vic., Australia", 11088 keywords = "algorithm; computer graphics; graph plotter; plotters", 11089 treatment = "P Practical", 11090} 11091 11092@Article{Byrne:1973:HMR, 11093 author = "J. G. Byrne", 11094 title = "{Hu-Tucker} minimum redundancy alphabetic coding method", 11095 journal = j-CACM, 11096 volume = "16", 11097 number = "8", 11098 pages = "490--490", 11099 month = aug, 11100 year = "1973", 11101 CODEN = "CACMA2", 11102 ISSN = "0001-0782", 11103 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11104 acknowledgement = ack-nhfb, 11105 classcodes = "C6130 (Data handling techniques)", 11106 corpsource = "Trinity Coll., Dublin, Ireland", 11107 keywords = "algorithm; alphabetic coding method; encoding; Hu; minimum redundancy; Tucker", 11108 treatment = "P Practical", 11109} 11110 11111@Article{Good:1973:CQ, 11112 author = "A. J. Good", 11113 title = "{Clenshaw-Curtis} quadrature", 11114 journal = j-CACM, 11115 volume = "16", 11116 number = "8", 11117 pages = "490--490", 11118 month = aug, 11119 year = "1973", 11120 CODEN = "CACMA2", 11121 ISSN = "0001-0782", 11122 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11123 acknowledgement = ack-nhfb, 11124 classcodes = "B0290M (Numerical integration and differentiation); C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 11125 corpsource = "Systems, Sci. and Software, La Jolla, CA, USA", 11126 keywords = "algorithm; Clenshaw Curtis quadrature; integration", 11127 treatment = "P Practical", 11128} 11129 11130@Article{Williams:1973:LRP, 11131 author = "E. J. Williams", 11132 title = "Localization of the roots of a polynomial", 11133 journal = j-CACM, 11134 volume = "16", 11135 number = "8", 11136 pages = "490--490", 11137 month = aug, 11138 year = "1973", 11139 CODEN = "CACMA2", 11140 ISSN = "0001-0782", 11141 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11142 acknowledgement = ack-nhfb, 11143 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C7310 (Mathematics computing)", 11144 corpsource = "Ford Motor Co., Dearborn, MI, USA", 11145 keywords = "algorithm; localization; polynomials; roots of a polynomial", 11146 treatment = "P Practical", 11147} 11148 11149@Article{Manna:1973:IMP, 11150 author = "Zohar Manna and Stephen Ness and Jean Vuillemin", 11151 title = "Inductive Methods for Proving Properties of Programs", 11152 journal = j-CACM, 11153 volume = "16", 11154 number = "8", 11155 pages = "491--502", 11156 month = aug, 11157 year = "1973", 11158 CODEN = "CACMA2", 11159 ISSN = "0001-0782", 11160 MRclass = "68A05", 11161 MRnumber = "51 2331", 11162 mrreviewer = "W. D. Maurer", 11163 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11164 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/ml.bib", 11165 abstract = "There are two main purposes in this paper: first, clarification and extension of known results about computation of recursive programs, with emphasis on the difference between the theoretical and practical approaches; second, presentation and examination of various known methods for proving properties of recursive programs. Discussed in detail are two powerful inductive methods, computational induction and structural induction, including examples of their application.", 11166 acknowledgement = ack-nhfb, 11167 classcodes = "C4240 (Programming and algorithm theory)", 11168 classification = "723", 11169 corpsource = "Stanford Univ., CA, USA", 11170 journalabr = "Commun ACM", 11171 keywords = "computability and decidability; computation induction; computer metatheory; inductive methods; least fixedpoint; programming theory; properties of programs; proving; recursive programs; structural induction", 11172 treatment = "T Theoretical or Mathematical", 11173} 11174 11175@Article{Peterson:1973:CWR, 11176 author = "W. W. Peterson and T. Kasami and N. Tokura", 11177 title = "On the Capabilities of While, Repeat, and Exit Statements", 11178 journal = j-CACM, 11179 volume = "16", 11180 number = "8", 11181 pages = "503--512", 11182 month = aug, 11183 year = "1973", 11184 CODEN = "CACMA2", 11185 ISSN = "0001-0782", 11186 MRclass = "68A05", 11187 MRnumber = "51 4707", 11188 mrreviewer = "J. E. L. Peck", 11189 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11190 bibsource = "Compendex database", 11191 abstract = "A well-formed program is defined as a program in which loops and if statements are properly nested and can be entered only at their beginning. A corresponding definition is given for a well-formed flowchart. It is shown that a program is well formed if and only if it can be written with if, repeat, and multi-level exit statements for sequence control. It is also shown that if, while, and repeat statements with single-level exit do not suffice. It is also shown that any flowchart can be converted to a well-formed flowchart by node splitting. Practical implications are discussed.", 11192 acknowledgement = ack-nhfb, 11193 classcodes = "C4240 (Programming and algorithm theory)", 11194 classification = "723", 11195 corpsource = "Univ. Hawaii, Honolulu, HI, USA", 11196 journalabr = "Commun ACM", 11197 keywords = "capabilities; computer metatheory; exit; exit statement; flowchart; go to statement; node splitting; programming theory; repeat statement; software reliability; statement; well formed program; well-formed program; while statement", 11198 treatment = "T Theoretical or Mathematical", 11199} 11200 11201@Article{Foster:1973:GAT, 11202 author = "Caxton C. Foster", 11203 title = "A Generalization of {AVL} Trees", 11204 journal = j-CACM, 11205 volume = "16", 11206 number = "8", 11207 pages = "513--517", 11208 month = aug, 11209 year = "1973", 11210 CODEN = "CACMA2", 11211 ISSN = "0001-0782", 11212 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11213 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 11214 abstract = "A generalization of AVL trees is proposed in which imbalances up to (triangle shape) is a small integer. An experiment is performed to compare these trees with standard AVL trees and with balanced trees on the basis of mean retrieval time, of amount of restructuring expected, and on the worst case of retrieval time. It is shown that, by permitting imbalances of up to five units, the retrieval time is increased a small amount while the amount of restructuring required is decreased by a factor of ten. \par A few theoretical results are derived, including the correction of an earlier paper, and are duly compared with the experimental data. Reasonably good correspondence is found.", 11215 acknowledgement = ack-nhfb, 11216 classcodes = "C4210 (Formal logic); C6120 (File organisation)", 11217 classification = "723; 901", 11218 corpsource = "Univ. Massachusetts, Amherst, MA, USA", 11219 journalabr = "Commun ACM", 11220 keywords = "AVL trees; balanced trees; file organisation; generalisation; information retrieval systems; information storage and; information storage and retrieval; retrieval; trees (mathematical)", 11221 treatment = "T Theoretical or Mathematical", 11222} 11223 11224@Article{Buzen:1973:CAC, 11225 author = "Jeffrey P. Buzen", 11226 title = "Computational Algorithms for Closed Queueing Networks with Exponential Servers", 11227 journal = j-CACM, 11228 volume = "16", 11229 number = "9", 11230 pages = "527--531", 11231 month = sep, 11232 year = "1973", 11233 CODEN = "CACMA2", 11234 ISSN = "0001-0782", 11235 MRclass = "68A10", 11236 MRnumber = "50 15423", 11237 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11238 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1973.bib", 11239 abstract = "Methods are presented for computing the equilibrium distribution of customers in closed queueing networks with exponential servers. Expressions for various marginal distributions are also derived. The computational algorithms are based on two-dimensional iterative techniques which are highly efficient and quite simple to implement. Implementation considerations such as storage allocation strategies and order of evaluation are examined in some detail.", 11240 acknowledgement = ack-nhfb, 11241 annote = "Methods are presented for computing the equilibrium distribution of customers in closed queueing networks with exponential servers. Expressions for various marginal distributions are also derived.", 11242 classcodes = "B0240C (Queueing theory); C1140C (Queueing theory)", 11243 classification = "912; 922", 11244 corpsource = "Harvard Univ., Cambridge, MA, USA", 11245 country = "USA", 11246 date = "14/12/79", 11247 descriptors = "Exponential queueing network; number of elements in system; method;", 11248 enum = "483", 11249 journalabr = "Commun ACM", 11250 keywords = "closed queueing networks; computational algorithms; distributions; equilibrium distributions; exponential servers; operations research; probability; queueing networks; queueing theory; steady state", 11251 language = "English", 11252 references = "6", 11253 treatment = "T Theoretical or Mathematical", 11254} 11255 11256@Article{Ganapathy:1973:ITA, 11257 author = "S. Ganapathy and V. Rajaraman", 11258 title = "Information Theory Applied to the Conversion of Decision Tables to Computer Programs", 11259 journal = j-CACM, 11260 volume = "16", 11261 number = "9", 11262 pages = "532--539", 11263 month = sep, 11264 year = "1973", 11265 CODEN = "CACMA2", 11266 ISSN = "0001-0782", 11267 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11268 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/inductive.inference.bib", 11269 abstract = "Using ideas from information theory, this paper develops a heuristic algorithm that converts a limited entry decision table to a tree structured computer program with near minimum average processing time. The method is applicable to any limited entry decision table and does not require that actions have single rules or that the cost of testing conditions be equal. It is thus more general than the previously published heuristic algorithms. Compared to the optimal algorithm of Reinwald and Soland, this algorithm is easy to code and takes a much smaller translation time; it is thus felt that it is more useful in practice. The algorithm is well suited for manual conversion of decision tables to flowcharts.", 11270 acknowledgement = ack-nhfb, 11271 classcodes = "C4240 (Programming and algorithm theory)", 11272 classification = "723; 731; 922", 11273 corpsource = "Indian Inst. Technol., New Delhi, India", 11274 journalabr = "Commun ACM", 11275 keywords = "computer; computer systems programming --- Decision Tables; conversion; decision tables; decision theory and analysis; information measure; information theory; optimum computer programs; programming theory; programs", 11276 treatment = "T Theoretical or Mathematical", 11277} 11278 11279@Article{Cardenas:1973:ESF, 11280 author = "Alfonso F. Cardenas", 11281 title = "Evaluation and Selection of File Organization --- {A} Model and a System", 11282 journal = j-CACM, 11283 volume = "16", 11284 number = "9", 11285 pages = "540--548", 11286 month = sep, 11287 year = "1973", 11288 CODEN = "CACMA2", 11289 ISSN = "0001-0782", 11290 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11291 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 11292 abstract = "This work first discusses the factors that affect file (data base) organization performance, an elusive subject, and then presents a methodology, a model and a programmed system to estimate primarily total storage costs and average access time of several file organizations, given a specific data base, query characterization and device-related specifications. Based on these estimates, an appropriate file structure may be selected for the specific situation. The system is a convenient tool to study file structures and to facilitate as much as possible the process of data base structure design and evaluation.", 11293 acknowledgement = ack-nhfb, 11294 annote = "Tree, indexed, and ring files compared for six files and various retrieval requests.", 11295 classcodes = "C6120 (File organisation)", 11296 classification = "723", 11297 corpsource = "Univ. California, Los Angeles, CA, USA", 11298 journalabr = "Commun ACM", 11299 keywords = "access time; data base; data management; data processing; data structures; design; evaluation; file management; file organisation; file organization; file structures; model; selection; simulation; storage requirement", 11300 treatment = "P Practical", 11301} 11302 11303@Article{Casey:1973:DTS, 11304 author = "R. G. Casey", 11305 title = "Design of Tree Structures for Efficient Querying", 11306 journal = j-CACM, 11307 volume = "16", 11308 number = "9", 11309 pages = "549--556", 11310 month = sep, 11311 year = "1973", 11312 CODEN = "CACMA2", 11313 ISSN = "0001-0782", 11314 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11315 bibsource = "Compendex database", 11316 abstract = "This paper poses an optimization problem in the design of such trees to serve a well-specified application. The problem is academic in the sense that ordinarily the optimal tree cannot be implemented by means of practical techniques. On the other hand, it is potentially useful for the comparison it affords between observed performance and that of an intuitively attractive ideal search procedure. As a practical application of such a model this paper considers the design of a novel tree search scheme based on a bit vector representation of data and shows that essentially the same algorithm can be used to design either an ideal search tree or a bit-vector tree. An experimental study of a small formatted file illustrates the concepts.", 11317 acknowledgement = ack-nhfb, 11318 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 11319 classification = "723; 901", 11320 corpsource = "IBM, San Jose, CA, USA", 11321 journalabr = "Commun ACM", 11322 keywords = "clustering; data; data structure; data structures; design; file organisation; information retrieval; information retrieval systems; information storage; information storage and; management; querying; retrieval; search; tree file; tree structures", 11323 treatment = "P Practical", 11324} 11325 11326@Article{Rodriguez-Rosell:1973:EWS, 11327 author = "Juan Rodriguez-Rosell", 11328 title = "Empirical Working Set Behavior", 11329 journal = j-CACM, 11330 volume = "16", 11331 number = "9", 11332 pages = "556--560", 11333 month = sep, 11334 year = "1973", 11335 CODEN = "CACMA2", 11336 ISSN = "0001-0782", 11337 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11338 bibsource = "Compendex database", 11339 abstract = "The working set model for program behavior has been proposed in recent years as a basis for the design of scheduling and paging algorithms. Although the words ``working set'' are now commonly encountered in the literature dealing with resource allocation, there is a dearth of published data on program working set behavior. It is the purpose of this paper to present empirical data from actual program measurements, in the hope that workers in the field might find experimental evidence upon which to substantiate and base theoretical work.", 11340 acknowledgement = ack-nhfb, 11341 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 11342 classification = "723", 11343 corpsource = "Royal Inst. Technol., Stockholm, Sweden", 11344 journalabr = "Commun ACM", 11345 keywords = "computer metatheory; measurement; operating systems (computers); paging; program behaviour; scheduling; software; software measurement; virtual memory; virtual storage; working set", 11346 treatment = "P Practical", 11347} 11348 11349@Article{Gates:1973:STS, 11350 author = "Geoffrey W. Gates and David A. Poplawski", 11351 title = "A simple technique for structured variable lookup", 11352 journal = j-CACM, 11353 volume = "16", 11354 number = "9", 11355 pages = "561--565", 11356 month = sep, 11357 year = "1973", 11358 CODEN = "CACMA2", 11359 ISSN = "0001-0782", 11360 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11361 bibsource = "Compendex database", 11362 abstract = "A simple technique for the symbol-table lookup of structured variables based on simple automata theory is presented. The technique offers a deterministic solution to a problem which is currently handled in a nondeterministic manner in PL/I and COBOL compilers.", 11363 acknowledgement = ack-nhfb, 11364 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", 11365 classification = "723", 11366 corpsource = "Michigan State Univ., East Lansing, MI, USA", 11367 journalabr = "Commun ACM", 11368 keywords = "automata theory; COBOL; computer programming languages; computer systems programming; deterministic; PL/1; PL/I; structured variable; table lookup", 11369 treatment = "P Practical", 11370} 11371 11372@Article{Zelkowitz:1973:RE, 11373 author = "M. V. Zelkowitz", 11374 title = "Reversible Execution", 11375 journal = j-CACM, 11376 volume = "16", 11377 number = "9", 11378 pages = "566--566", 11379 month = sep, 11380 year = "1973", 11381 CODEN = "CACMA2", 11382 ISSN = "0001-0782", 11383 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11384 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/debug.bib", 11385 acknowledgement = ack-nhfb, 11386 classcodes = "C6140D (High level languages); C6150G (Diagnostic, testing, debugging and evaluating systems)", 11387 corpsource = "Univ. Maryland, Baltimore, MD, USA", 11388 keywords = "backtracking; computer program; debugging; PL/I; program debugging; programming language; programming languages; reversible execution", 11389 treatment = "P Practical", 11390} 11391 11392@Article{Barnhill:1973:SKC, 11393 author = "Robert E. Barnhill and David T. Pilcher", 11394 title = "{Sard} kernels for certain bivariate cubatures", 11395 journal = j-CACM, 11396 volume = "16", 11397 number = "9", 11398 pages = "567--571 (or 567--570??)", 11399 month = sep, 11400 year = "1973", 11401 CODEN = "CACMA2", 11402 ISSN = "0001-0782", 11403 MRclass = "65D30", 11404 MRnumber = "52 2150", 11405 mrreviewer = "P. Brock", 11406 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11407 bibsource = "Compendex database", 11408 abstract = "An error analysis for some bivariate cubatures is given. The remainders are obtained by the use of Sard kernels. Numerical results and computer graphs are given for some of the kernel functions.", 11409 acknowledgement = ack-nhfb, 11410 classcodes = "B0290B (Error analysis in numerical methods); B0290M (Numerical integration and differentiation); C4110 (Error analysis in numerical methods); C4160 (Numerical integration and differentiation)", 11411 classification = "921", 11412 corpsource = "Univ. Utah, Salt Lake City, UT, USA", 11413 journalabr = "Commun ACM", 11414 keywords = "bivariate cubatures; cubatures; error analysis; integration; mathematical techniques; numerical integration; numerical methods; remainder formulas; Sard kernels", 11415 treatment = "T Theoretical or Mathematical", 11416} 11417 11418@Article{Hunter:1973:AAA, 11419 author = "D. B. Hunter and J. M. Williams", 11420 title = "{ACM} Algorithm 455: Analysis of Skew Representations of the Symmetric Group", 11421 journal = j-CACM, 11422 volume = "16", 11423 number = "9", 11424 pages = "571--572", 11425 month = sep, 11426 year = "1973", 11427 CODEN = "CACMA2", 11428 ISSN = "0001-0782", 11429 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11430 acknowledgement = ack-nhfb, 11431 classcodes = "C7310 (Mathematics computing)", 11432 corpsource = "Univ. Bradford, UK", 11433 keywords = "ALGOL; analysis; binary model; group theory; lattice; outer product; permutation; skew representations; subroutines; symmetric group", 11434 treatment = "P Practical", 11435} 11436 11437@Article{Fencl:1973:AAR, 11438 author = "Zden{\v{e}}k Fencl", 11439 title = "{ACM} Algorithm 456: Routing Problem", 11440 journal = j-CACM, 11441 volume = "16", 11442 number = "9", 11443 pages = "572--574", 11444 month = sep, 11445 year = "1973", 11446 CODEN = "CACMA2", 11447 ISSN = "0001-0782", 11448 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11449 acknowledgement = ack-nhfb, 11450 classcodes = "C7310 (Mathematics computing)", 11451 corpsource = "RCA, Marlborough, MA, USA", 11452 keywords = "FORTRAN; graph theory; Hamiltonian circuit; optimisation; routing problem; shortest path; subroutines; travelling salesman problem", 11453 treatment = "P Practical", 11454} 11455 11456@Article{Bron:1973:AAF, 11457 author = "Coen Bron and Joep Kerbosch", 11458 title = "{ACM} Algorithm 457: Finding All Cliques of an Undirected Graph", 11459 journal = j-CACM, 11460 volume = "16", 11461 number = "9", 11462 pages = "575--577", 11463 month = sep, 11464 year = "1973", 11465 CODEN = "CACMA2", 11466 ISSN = "0001-0782", 11467 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11468 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib and ftp://ftp.ira.uka.de/pub/bibliography/Theory/clique.color.bib", 11469 acknowledgement = ack-nhfb, 11470 annote = "An implicit enumeration algorithm for listing all cliques in a graph. Includes easily translated code.", 11471 classcodes = "C7310 (Mathematics computing)", 11472 corpsource = "Technol. Univ., Eindhoven, Netherlands", 11473 keywords = "ALGOL; backtracking algorithm; branch and bound technique; cliques; clusters; fgraph coloring related clique backtracking branch and bound; graph theory; maximal complete; recursion; subgraph; subroutines; undirected graph", 11474 treatment = "P Practical", 11475} 11476 11477@Article{Roy:1973:RAG, 11478 author = "M. K. Roy", 11479 title = "Remark on {``Algorithm 323 [G6]: Generation of Permutations in Lexicographic Order''}", 11480 journal = j-CACM, 11481 volume = "16", 11482 number = "9", 11483 pages = "577--578", 11484 month = sep, 11485 year = "1973", 11486 CODEN = "CACMA2", 11487 ISSN = "0001-0782", 11488 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11489 acknowledgement = ack-nhfb, 11490 classcodes = "C7310 (Mathematics computing)", 11491 corpsource = "Jadavpur Univ., Calcutta, India", 11492 keywords = "algorithm; generation; lexicographic order; permutations; statistics", 11493 treatment = "P Practical", 11494} 11495 11496@Article{Roy:1973:RGP, 11497 author = "Mohit Kumar Roy", 11498 title = "Remark on {``Algorithm 323 [G6]: Generation of Permutations in Lexicographic Order''}", 11499 journal = j-CACM, 11500 volume = "16", 11501 number = "9", 11502 pages = "577--578", 11503 month = sep, 11504 year = "1973", 11505 CODEN = "CACMA2", 11506 ISSN = "0001-0782", 11507 bibdate = "Sat Jan 18 14:55:49 1997", 11508} 11509 11510@Article{Lawrence:1973:SMP, 11511 author = "E. E. Lawrence", 11512 title = "A sparse matrix package. {I}", 11513 journal = j-CACM, 11514 volume = "16", 11515 number = "9", 11516 pages = "578--578", 11517 month = sep, 11518 year = "1973", 11519 CODEN = "CACMA2", 11520 ISSN = "0001-0782", 11521 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11522 acknowledgement = ack-nhfb, 11523 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C7310 (Mathematics computing)", 11524 corpsource = "Mullard Ltd., Mitcham, UK", 11525 keywords = "algorithm; matrix algebra; sparse matrix package", 11526 treatment = "P Practical", 11527} 11528 11529@Article{Williamson:1973:HPP, 11530 author = "H. Williamson", 11531 title = "Hidden-line plotting program", 11532 journal = j-CACM, 11533 volume = "16", 11534 number = "9", 11535 pages = "578--579", 11536 month = sep, 11537 year = "1973", 11538 CODEN = "CACMA2", 11539 ISSN = "0001-0782", 11540 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11541 acknowledgement = ack-nhfb, 11542 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques)", 11543 corpsource = "Nat. Con-Serv. Inc., Austin, TX, USA", 11544 keywords = "algorithm; computer graphics; data handling; hidden line plotting; program", 11545 treatment = "P Practical", 11546} 11547 11548@Article{Driessen:1973:LRP, 11549 author = "H. B. Driessen and E. W. LeM. Hunt", 11550 title = "Localization of the roots of a polynomial", 11551 journal = j-CACM, 11552 volume = "16", 11553 number = "9", 11554 pages = "579--579", 11555 month = sep, 11556 year = "1973", 11557 CODEN = "CACMA2", 11558 ISSN = "0001-0782", 11559 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11560 acknowledgement = ack-nhfb, 11561 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C7310 (Mathematics computing)", 11562 corpsource = "Supreme Headquarters Allied Powers Europe, The Hague, Netherlands", 11563 keywords = "algorithm; localization; polynomial; polynomials; roots", 11564 treatment = "P Practical", 11565} 11566 11567@Article{McGeachie:1973:MTU, 11568 author = "John S. McGeachie", 11569 title = "Multiple Terminals Under User Program Control in a Time-Sharing Environment", 11570 journal = j-CACM, 11571 volume = "16", 11572 number = "10", 11573 pages = "587--590", 11574 month = oct, 11575 year = "1973", 11576 CODEN = "CACMA2", 11577 ISSN = "0001-0782", 11578 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11579 bibsource = "Compendex database", 11580 abstract = "User-written programs on the Dartmouth Time-Sharing System can communicate with many remote terminals simultaneously and can control the interactions between these terminals. Such programs can be written using standard input and output instructions in any language available on the system. This paper describes how this multiple-terminal facility was implemented without requiring any changes in the system executive or in any of the system's compilers or interpreters.", 11581 acknowledgement = ack-nhfb, 11582 classcodes = "C6150J (Operating systems)", 11583 classification = "722", 11584 corpsource = "Dartmouth Coll., Hanover, NH, USA", 11585 journalabr = "Commun ACM", 11586 keywords = "computer systems, digital; multiple terminals; on-line interaction; remote consoles; time sharing; time-sharing programs; user program control", 11587 treatment = "P Practical", 11588} 11589 11590@Article{Bobrow:1973:MSI, 11591 author = "Daniel G. Bobrow and Ben Wegbreit", 11592 title = "A Model and Stack Implementation of Multiple Environments", 11593 journal = j-CACM, 11594 volume = "16", 11595 number = "10", 11596 pages = "591--603", 11597 month = oct, 11598 year = "1973", 11599 CODEN = "CACMA2", 11600 ISSN = "0001-0782", 11601 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11602 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 11603 abstract = "This paper presents an implementation technique using a single stack to hold procedure activation storage which allows retention of that storage for durations not necessarily tied to control flow. The technique has the property that, in the simple case, it runs identically to the usual automatic stack allocation and deallocation procedure. Applications of this technique to multitasking, coroutines, backtracking, label-valued variables, and functional arguments are discussed. In the initial model, a single real processor is assumed, and the implementation assumes multiple-processes coordinate by passing control explicitly to one another.", 11604 acknowledgement = ack-nhfb, 11605 classcodes = "C6110 (Systems analysis and programming); C6120 (File organisation)", 11606 classification = "723", 11607 corpsource = "Xerox Palo Alto Res. Center, CA, USA", 11608 journalabr = "Commun ACM", 11609 keywords = "computer programming; control; coroutines; dendrarchy; dynamic; funarg problem; label-valued variables; model; multiple environments; multiprocessing programs; multiprocessor; multitasking; programming; retention; stack allocation; stack implementation; storage allocation; structures; systems", 11610 treatment = "P Practical", 11611} 11612 11613@Article{Lum:1973:GPA, 11614 author = "Vincent Y. Lum", 11615 title = "General Performance Analysis of Key-to-Address Transformation Methods Using an Abstract File Concept", 11616 journal = j-CACM, 11617 volume = "16", 11618 number = "10", 11619 pages = "603--612", 11620 month = oct, 11621 year = "1973", 11622 CODEN = "CACMA2", 11623 ISSN = "0001-0782", 11624 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11625 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 11626 abstract = "This paper presents a new approach to the analysis of performance of the various key-to-address transformation methods. In this approach the keys in a file are assumed to have been selected from the key space according to a certain probabilistic selection algorithm. All files with the same number of keys selected from this key space will be suitably weighted in accordance with the algorithm, and the average performance of the transformation methods on these files will be used as the potential of these methods. Using this analysis, methods with the same overall performance can be classified and key distributions partial to certain transformations can be identified. All this can be done analytically. The approach is applied to a group of transformation methods using files whose keys are selected randomly.", 11627 acknowledgement = ack-nhfb, 11628 annote = "analysis and results using distributions from the entire key domain.", 11629 classcodes = "C6120 (File organisation)", 11630 classification = "723; 901", 11631 corpsource = "IBM Res. Lab., San Jose, CA, USA", 11632 journalabr = "Commun ACM", 11633 keywords = "abstract file concept; access; direct addressing; file organisation; hashing; information retrieval systems; key to address transformation; performance analysis; random; scatter storage; storage management", 11634 treatment = "A Application; T Theoretical or Mathematical", 11635} 11636 11637@Article{Lampson:1973:NCP, 11638 author = "Butler W. Lampson", 11639 title = "A Note on the Confinement Problem", 11640 journal = j-CACM, 11641 volume = "16", 11642 number = "10", 11643 pages = "613--615", 11644 month = oct, 11645 year = "1973", 11646 CODEN = "CACMA2", 11647 ISSN = "0001-0782", 11648 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11649 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 11650 abstract = "This note explores the problem of confining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified.", 11651 acknowledgement = ack-nhfb, 11652 annote = "Prevention of privacy leaks between programs.", 11653 classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", 11654 classification = "723", 11655 corpsource = "Xerox Palo Alto Res. Center, CA, USA", 11656 journalabr = "Commun ACM", 11657 keywords = "computer systems programming; confinement; leakage of data; operating systems (computers); privacy; proprietary program; protection; security; security of data", 11658 treatment = "P Practical", 11659} 11660 11661@Article{Hirschberg:1973:CDM, 11662 author = "Daniel S. Hirschberg", 11663 title = "A Class of Dynamic Memory Allocation Algorithms", 11664 journal = j-CACM, 11665 volume = "16", 11666 number = "10", 11667 pages = "615--618", 11668 month = oct, 11669 year = "1973", 11670 CODEN = "CACMA2", 11671 ISSN = "0001-0782", 11672 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11673 bibsource = "Compendex database", 11674 abstract = "A new dynamic memory allocation algorithm, the Fibonacci system, is introduced. This algorithm is similar to, but seems to have certain advantages over, the ``buddy'' system. A generalization is mentioned which includes both of these systems as special cases.", 11675 acknowledgement = ack-nhfb, 11676 classcodes = "C6120 (File organisation)", 11677 classification = "723", 11678 corpsource = "Princeton Univ., NJ, USA", 11679 journalabr = "Commun ACM", 11680 keywords = "buddy system; computer operating systems; dynamic memory allocation algorithms; dynamic storage allocation; Fibonacci; Fibonacci system; fragmentation; simulation; storage allocation", 11681 treatment = "P Practical", 11682} 11683 11684@Article{Prieve:1973:UPR, 11685 author = "Barton G. Prieve", 11686 title = "Using Page Residency to Select the Working Set Parameter", 11687 journal = j-CACM, 11688 volume = "16", 11689 number = "10", 11690 pages = "619--620", 11691 month = oct, 11692 year = "1973", 11693 CODEN = "CACMA2", 11694 ISSN = "0001-0782", 11695 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11696 bibsource = "Compendex database", 11697 abstract = "Denning's method for selecting the working set parameter, which uses interreference intervals, is examined. Several omissions in his model are noted, and new assumptions are introduced to overcome these omissions. Using this modified model, Denning's results on page residency are rederived and reconsidered for selecting the working set parameter.", 11698 acknowledgement = ack-nhfb, 11699 classcodes = "C4240 (Programming and algorithm theory); C6120 (File organisation)", 11700 classification = "723", 11701 corpsource = "Bell Telephone Labs., Inc., Naperville, IL, USA", 11702 journalabr = "Commun ACM", 11703 keywords = "computer operating systems; page residency; program behaviour; programming theory; virtual storage; working set parameter", 11704 treatment = "T Theoretical or Mathematical", 11705} 11706 11707@Article{Millstein:1973:CSI, 11708 author = "Robert E. Millstein", 11709 title = "Control Structures in {Illiac IV Fortran}", 11710 journal = j-CACM, 11711 volume = "16", 11712 number = "10", 11713 pages = "621--627", 11714 month = oct, 11715 year = "1973", 11716 CODEN = "CACMA2", 11717 ISSN = "0001-0782", 11718 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11719 bibsource = "Compendex database", 11720 abstract = "As part of an effort to design and implement a Fortran compiler on the ILLIAC IV, an extended Fortran, called IVTRAN, has been developed. This language provides a means of expressing data and control structures suitable for exploiting ILLIAC IV parallelism. \par This paper reviews the hardware characteristics of the ILLIAC and singles out unconventional features which could be expected to influence language (and compiler) design. The implications of these features for data layout and algorithm structure are discussed, and the conclusion is drawn that data allocation rather than code structuring is the crucial ILLIAC optimization problem. A satisfactory method of data allocation is then presented. Language structures to utilize this storage method and express parallel algorithms are described.", 11721 acknowledgement = ack-nhfb, 11722 classcodes = "C6140D (High level languages); C6150C (Compilers, interpreters and other processors)", 11723 classification = "723", 11724 corpsource = "Massachusetts Computer Associates, Inc., Wakefield, MA, USA", 11725 journalabr = "Commun ACM", 11726 keywords = "array allocation; array processing; computer programming languages; control structures; explicit parallelism; FORTRAN; ILLIAC IV; ILLIAC IV Fortran; parallel control; parallel control structures; parallel processing; parallelism detection; procedure oriented languages; program compilers; structures", 11727 treatment = "P Practical", 11728} 11729 11730@Article{Robers:1973:AAD, 11731 author = "P. D. Robers and S. S. Robers", 11732 title = "{ACM} Algorithm 458: Discrete Linear ${L}_1$ Approximation by Interval Linear Programming", 11733 journal = j-CACM, 11734 volume = "16", 11735 number = "10", 11736 pages = "629--631", 11737 month = oct, 11738 year = "1973", 11739 CODEN = "CACMA2", 11740 ISSN = "0001-0782", 11741 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11742 acknowledgement = ack-nhfb, 11743 classcodes = "B0260 (Optimisation techniques); B0290F (Interpolation and function approximation); C1180 (Optimisation techniques); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 11744 corpsource = "Ernst and Ernst, Washington, DC, USA", 11745 keywords = "discrete linear; FORTRAN; function approximation; interval linear programming; L/sub 1/ approximation; linear programming; suboptimisation method; subroutine; subroutines", 11746 treatment = "P Practical", 11747} 11748 11749@Article{Syslo:1973:AAE, 11750 author = "M. M. Syslo", 11751 title = "{ACM} Algorithm 459: The Elementary Circuits of a Graph", 11752 journal = j-CACM, 11753 volume = "16", 11754 number = "10", 11755 pages = "632--633", 11756 month = oct, 11757 year = "1973", 11758 CODEN = "CACMA2", 11759 ISSN = "0001-0782", 11760 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11761 acknowledgement = ack-nhfb, 11762 classcodes = "C7310 (Mathematics computing)", 11763 corpsource = "Univ. Wroclaw, Poland", 11764 keywords = "ALGOL; elementary circuits; graph; graph theory; path search algorithm; subroutines", 11765 treatment = "P Practical", 11766} 11767 11768@Article{Saylor:1973:AAC, 11769 author = "Paul E. Saylor and James D. Sebastian", 11770 title = "{ACM} Algorithm 460: Calculation of Optimum Parameters for Alternating Direction Implicit Procedures", 11771 journal = j-CACM, 11772 volume = "16", 11773 number = "10", 11774 pages = "633--635", 11775 month = oct, 11776 year = "1973", 11777 CODEN = "CACMA2", 11778 ISSN = "0001-0782", 11779 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11780 acknowledgement = ack-nhfb, 11781 classcodes = "B0290P (Differential equations); C4170 (Differential equations); C7310 (Mathematics computing)", 11782 corpsource = "Univ. Illinois, Urbana, IL, USA", 11783 keywords = "alternating direction implicit; differential equations; elliptic difference; equations; FORTRAN; optimum parameters; procedures; simultaneous equations; subroutine; subroutines", 11784 treatment = "P Practical", 11785} 11786 11787@Article{Burkowski:1973:AAC, 11788 author = "F. J. Burkowski and W. D. Hoskins", 11789 title = "{ACM} Algorithm 461: Cubic Spline Solutions to a Class of Functional Differential Equations", 11790 journal = j-CACM, 11791 volume = "16", 11792 number = "10", 11793 pages = "635--637", 11794 month = oct, 11795 year = "1973", 11796 CODEN = "CACMA2", 11797 ISSN = "0001-0782", 11798 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11799 acknowledgement = ack-nhfb, 11800 classcodes = "B0290F (Interpolation and function approximation); B0290P (Differential equations); C4130 (Interpolation and function approximation); C4170 (Differential equations); C7310 (Mathematics computing)", 11801 corpsource = "Univ. Manitoba, Winnipeg, Man., Canada", 11802 keywords = "(mathematics); boundary value problem; boundary-value problems; cubic spline solutions; differential equations; FORTRAN; functional differential equations; piecewise continuous approximation; splines; SPNBVF; subroutine; subroutines", 11803 treatment = "P Practical", 11804} 11805 11806@Article{Donnelly:1973:AAB, 11807 author = "T. G. Donnelly", 11808 title = "{ACM} Algorithm 462: Bivariate Normal Distribution", 11809 journal = j-CACM, 11810 volume = "16", 11811 number = "10", 11812 pages = "638--638", 11813 month = oct, 11814 year = "1973", 11815 CODEN = "CACMA2", 11816 ISSN = "0001-0782", 11817 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11818 acknowledgement = ack-nhfb, 11819 classcodes = "C7310 (Mathematics computing)", 11820 corpsource = "Univ. North Carolina, Chapel Hill, NC, USA", 11821 keywords = "bivariate normal distribution; FORTRAN; frequency distribution; statistics; subroutine; subroutines", 11822 treatment = "P Practical", 11823} 11824 11825@Article{Lewart:1973:AAA, 11826 author = "C. R. Lewart", 11827 title = "{ACM} Algorithm 463: Algorithms {SCALE}1, {SCALE}2, and {SCALE}3 for Determination of Scales on Computer Generated Plots", 11828 journal = j-CACM, 11829 volume = "16", 11830 number = "10", 11831 pages = "639--640", 11832 month = oct, 11833 year = "1973", 11834 CODEN = "CACMA2", 11835 ISSN = "0001-0782", 11836 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11837 acknowledgement = ack-nhfb, 11838 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques)", 11839 corpsource = "Bell Telephone Lab., Inc., Holmdel, NJ, USA", 11840 keywords = "algorithms; computer generated plots; computer graphics; determination of; FORTRAN; SCALE 1; SCALE 2; SCALE 3; scales; subroutines", 11841 treatment = "P Practical", 11842} 11843 11844@Article{Bachman:1973:PN, 11845 author = "Charles W. Bachman", 11846 title = "The Programmer as Navigator", 11847 journal = j-CACM, 11848 volume = "16", 11849 number = "11", 11850 pages = "653--658", 11851 month = nov, 11852 year = "1973", 11853 CODEN = "CACMA2", 11854 ISSN = "0001-0782", 11855 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11856 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 11857 note = "1973 ACM Turing Award Lecture.", 11858 acknowledgement = ack-nhfb, 11859 annote = "Turing award acceptance speech-general view of the state of database work from a DBTG originator.", 11860 classcodes = "C6110 (Systems analysis and programming); C6120 (File organisation); C6130 (Data handling techniques)", 11861 corpsource = "Honeywell Information Systems Inc., Waltham, MA, USA", 11862 keywords = "access; addressing; data handling; database; file organisation; network hierarchical data model CACM; programmer; programming", 11863 treatment = "G General Review", 11864} 11865 11866@Article{Fabry:1973:DVO, 11867 author = "R. S. Fabry", 11868 title = "Dynamic Verification of Operating System Decisions", 11869 journal = j-CACM, 11870 volume = "16", 11871 number = "11", 11872 pages = "659--668", 11873 month = nov, 11874 year = "1973", 11875 CODEN = "CACMA2", 11876 ISSN = "0001-0782", 11877 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11878 bibsource = "Compendex database", 11879 abstract = "Dynamic verification of a decision implies that every time the decision is made there is a consistency check performed on the decision using independent hardware and software. The dynamic verification of operating system decisions is used on the PRIME system being designed and constructed at the University of California, Berkeley. PRIME is an experimental time-sharing system which is to have the properties of continuous availability, data privacy, and cost effectiveness. The technique of dynamic verification allows the construction of an operating system which does not make certain decisions improperly even in the presence of a single hardware or software fault. Furthermore, multiple faults lead to unreliable operation only if the faults happen to reinforce each other. On PRIME, dynamic verification is used to ensure that one user's information cannot become available to another user gratuitously even in the presence of a single hardware or software fault.", 11880 acknowledgement = ack-nhfb, 11881 classcodes = "C6150G (Diagnostic, testing, debugging and evaluating systems); C6150J (Operating systems)", 11882 classification = "722; 723", 11883 corpsource = "Univ. California, Berkeley, CA, USA", 11884 journalabr = "Commun ACM", 11885 keywords = "computer operating systems; computer systems; computer systems, digital; data privacy; data security; dynamic verification; fault tolerance; modular; operating systems; operating systems (computers); program verification; reliability; security of data; software", 11886 treatment = "P Practical; X Experimental", 11887} 11888 11889@Article{Mickunas:1973:PSC, 11890 author = "M. D. Mickunas and V. B. Schneider", 11891 title = "Parser-Generating System for Constructing Compressed Compilers", 11892 journal = j-CACM, 11893 volume = "16", 11894 number = "11", 11895 pages = "669--676", 11896 month = nov, 11897 year = "1973", 11898 CODEN = "CACMA2", 11899 ISSN = "0001-0782", 11900 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11901 bibsource = "Compendex database", 11902 abstract = "This paper describes a parser-generating system (PGS) currently in use on the CDC-6500 computer at Purdue University. The PGS is a FORTRAN-coded program that accepts a translation grammar as input and constructs from it a compact, machine-coded compiler. In the input translation grammar, each BNF syntactic rule corresponds to a (possibly empty) ``code generator'' realizable as an assembly language, FORTRAN or Algol, subroutine that is called whenever that syntactic rule is applied in the parse of a program. Typical one-pass compilers constructed by the PGS translate source programs at speeds approaching 14,000 cards per minute. For an XPL compiler, the parser program and its tables currently occupy 288 words of 60-bit core memory of which 140 words are parsing table entries and 82 words are links to code generators.", 11903 acknowledgement = ack-nhfb, 11904 classcodes = "C4210 (Formal logic); C4220 (Automata theory); C6150C (Compilers, interpreters and other processors)", 11905 classification = "723", 11906 corpsource = "Purdue Univ., Lafayette, IN, USA", 11907 journalabr = "Commun ACM", 11908 keywords = "BNF; compression algorithm; computer operating systems --- Program Compilers; computer programming languages; data compression; grammars; interpreters; parser generators; program; program compilers; pushdown automata; syntactic analysis; translation grammars; translator writing systems", 11909 treatment = "A Application; T Theoretical or Mathematical", 11910} 11911 11912@Article{Jordan:1973:SCA, 11913 author = "B. W. {Jordan, Jr.} and R. C. Barrett", 11914 title = "Scan Conversion Algorithm with Reduced Storage Requirements", 11915 journal = j-CACM, 11916 volume = "16", 11917 number = "11", 11918 pages = "676--682", 11919 month = nov, 11920 year = "1973", 11921 CODEN = "CACMA2", 11922 ISSN = "0001-0782", 11923 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11924 bibsource = "Compendex database", 11925 abstract = "The scan conversion algorithm that is described uses a linked list data structure to process the lines of the drawing in strips corresponding to groups of scan lines. A relatively small primary memory buffer area is used to accumulate the binary image for a group of scan lines. When this portion of the drawing has been plotted, the buffer is reused for the next portion. Because of the list processing procedures used, only a single pass through the XY display file is required when generating the binary image and only a slight increase in execution time over the fully buffered core results. Results show that storage requirements can be reduced by more than 80\% while causing less than a 10\% increase in execution time.", 11926 acknowledgement = ack-nhfb, 11927 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques)", 11928 classification = "723", 11929 corpsource = "Northwestern Univ., Evanston, IL, USA", 11930 journalabr = "Commun ACM", 11931 keywords = "computer graphics; data handling; discrete image; dot generation; line drawing; raster plotter; reduced storage requirements; scan conversion; scan conversion algorithm", 11932 treatment = "P Practical", 11933} 11934 11935@Article{Slagle:1973:EAT, 11936 author = "James R. Slagle and Lewis M. Norton", 11937 title = "Experiments with an Automatic Theorem-Prover Having Partial Ordering Inference Rules", 11938 journal = j-CACM, 11939 volume = "16", 11940 number = "11", 11941 pages = "682--688", 11942 month = nov, 11943 year = "1973", 11944 CODEN = "CACMA2", 11945 ISSN = "0001-0782", 11946 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11947 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib", 11948 abstract = "This paper presents a detailed description of the program and a comprehensive account of the experiments that have been performed with it.", 11949 acknowledgement = ack-nhfb, 11950 classcodes = "C1230 (Artificial intelligence)", 11951 classification = "723", 11952 corpsource = "Nat. Inst. Health, Bethesda, MD, USA", 11953 journalabr = "Commun ACM", 11954 keywords = "computer programming; heuristics; inference rules; paramodulation; partial ordering; resolution; theorem proving", 11955 treatment = "X Experimental", 11956} 11957 11958@Article{Reinsch:1973:AAE, 11959 author = "C. H. Reinsch", 11960 title = "{ACM} Algorithm 464: Eigenvalues of a Real Symmetric Tridiagonal Matrix", 11961 journal = j-CACM, 11962 volume = "16", 11963 number = "11", 11964 pages = "689--689", 11965 month = nov, 11966 year = "1973", 11967 CODEN = "CACMA2", 11968 ISSN = "0001-0782", 11969 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11970 acknowledgement = ack-nhfb, 11971 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C7310 (Mathematics computing)", 11972 corpsource = "Tech. Univ., M{\"u}nchen, West Germany", 11973 keywords = "ALGOL; eigenvalues; eigenvalues and eigenfunctions; matrix; matrix algebra; QR; real; subroutines; symmetric; transformation; tridiagonal", 11974 treatment = "P Practical", 11975} 11976 11977@Article{Hill:1973:AAS, 11978 author = "G. W. Hill", 11979 title = "{ACM} Algorithm 465: {Student}'s $t$ Frequency", 11980 journal = j-CACM, 11981 volume = "16", 11982 number = "11", 11983 pages = "690--690", 11984 month = nov, 11985 year = "1973", 11986 CODEN = "CACMA2", 11987 ISSN = "0001-0782", 11988 bibdate = "Tue Mar 25 13:26:09 MST 1997", 11989 acknowledgement = ack-nhfb, 11990 classcodes = "C7310 (Mathematics computing)", 11991 corpsource = "CSIRO, Glen Osmond, SA, Australia", 11992 keywords = "ALGOL; approximation; density function; series; statistics; student's t statistic; subroutine; subroutines", 11993 treatment = "P Practical", 11994} 11995 11996@Article{Ehrlich:1973:AAF, 11997 author = "G. Ehrlich", 11998 title = "{ACM} Algorithm 466: Four Combinatorial Algorithms", 11999 journal = j-CACM, 12000 volume = "16", 12001 number = "11", 12002 pages = "690--691", 12003 month = nov, 12004 year = "1973", 12005 CODEN = "CACMA2", 12006 ISSN = "0001-0782", 12007 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12008 acknowledgement = ack-nhfb, 12009 classcodes = "C7310 (Mathematics computing)", 12010 corpsource = "Weizmann Inst. Sci., Rehovot, Israel", 12011 keywords = "combinations; combinatorial algorithms; permutations; PL/1; statistics; subroutines", 12012 treatment = "P Practical", 12013} 12014 12015@Article{Brenner:1973:AAM, 12016 author = "N. Brenner", 12017 title = "{ACM} Algorithm 467: Matrix Transposition in Place", 12018 journal = j-CACM, 12019 volume = "16", 12020 number = "11", 12021 pages = "692--694", 12022 month = nov, 12023 year = "1973", 12024 CODEN = "CACMA2", 12025 ISSN = "0001-0782", 12026 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12027 note = "See also \cite{Leathers:1979:RAS}.", 12028 acknowledgement = ack-nhfb, 12029 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C7310 (Mathematics computing)", 12030 corpsource = "MIT, Cambridge, MA, USA", 12031 keywords = "in place; matrix algebra; matrix operations; number theory; permutations; primitive; rectangular matrix; roots; subroutines; transposition", 12032 treatment = "P Practical", 12033} 12034 12035@Article{Patterson:1973:AAA, 12036 author = "T. N. L. Patterson", 12037 title = "{ACM} Algorithm 468: Algorithm for Automatic Numerical Integration Over a Finite Interval", 12038 journal = j-CACM, 12039 volume = "16", 12040 number = "11", 12041 pages = "694--699", 12042 month = nov, 12043 year = "1973", 12044 CODEN = "CACMA2", 12045 ISSN = "0001-0782", 12046 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12047 acknowledgement = ack-nhfb, 12048 classcodes = "B0290M (Numerical integration and differentiation); C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 12049 keywords = "finite interval; FORTRAN algorithm; integration; numerical; numerical integration; numerical methods; quadrature; subroutines", 12050 treatment = "P Practical", 12051} 12052 12053@Article{Lam:1973:AAA, 12054 author = "C. Lam and J. McKay", 12055 title = "{ACM} Algorithm 469: Arithmetic Over a Finite Field", 12056 journal = j-CACM, 12057 volume = "16", 12058 number = "11", 12059 pages = "699--699", 12060 month = nov, 12061 year = "1973", 12062 CODEN = "CACMA2", 12063 ISSN = "0001-0782", 12064 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12065 acknowledgement = ack-nhfb, 12066 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C5230 (Digital arithmetic methods); C7310 (Mathematics computing)", 12067 corpsource = "Caltech Univ., Pasadena, CA, USA", 12068 keywords = "algebra; ALGOL; arithmetic; digital arithmetic; finite field; linear algebra; rational operations; subroutines", 12069 treatment = "P Practical", 12070} 12071 12072@Article{Denning:1973:NSO, 12073 author = "Peter J. Denning and G. Scott Graham", 12074 title = "A Note on Subexpression Ordering in the Execution of Arithmetic Expressions", 12075 journal = j-CACM, 12076 volume = "16", 12077 number = "11", 12078 pages = "700--702", 12079 month = nov, 12080 year = "1973", 12081 CODEN = "CACMA2", 12082 ISSN = "0001-0782", 12083 MRclass = "68A20", 12084 MRnumber = "50 11844", 12085 mrreviewer = "B. S. Baker", 12086 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12087 bibsource = "Compendex database", 12088 note = "Erratum, ibid. 17, 1974, 455.", 12089 abstract = "A counterexample to the supposed optimality of an algorithm for generating schedules for trees of tasks with unequal execution times is presented. A comparison with the ``critical path'' heuristic is discussed.", 12090 acknowledgement = ack-nhfb, 12091 classcodes = "C4240 (Programming and algorithm theory); C5230 (Digital arithmetic methods); C6150J (Operating systems)", 12092 classification = "723", 12093 corpsource = "Purdue Univ., Lafayette, IN, USA", 12094 journalabr = "Commun ACM", 12095 keywords = "arithmetic expressions; computer operating systems; digital arithmetic; execution; multiprocessing programs; multiprocessor scheduling; ordering; scheduling; subexpression; task; tree scheduling", 12096 treatment = "T Theoretical or Mathematical", 12097} 12098 12099@Article{Feldman:1973:CBS, 12100 author = "Jerome A. Feldman and James R. Low and R. P. Brent", 12101 title = "Comment on {Brent}'s scatter storage algorithm (and author's reply)", 12102 journal = j-CACM, 12103 volume = "16", 12104 number = "11", 12105 pages = "703--703", 12106 month = nov, 12107 year = "1973", 12108 CODEN = "CACMA2", 12109 ISSN = "0001-0782", 12110 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12111 acknowledgement = ack-nhfb, 12112 classcodes = "C6120 (File organisation)", 12113 corpsource = "Stanford Univ., CA, USA", 12114 keywords = "dynamic chaining; file organisation; hashing; Hashing; information storage and retrieval; scatter storage; scatter storage algorithm; searching; storage allocation; storage management; symbol table", 12115 treatment = "T Theoretical or Mathematical", 12116} 12117 12118@Article{Wegner:1973:TP, 12119 author = "E. Wegner", 12120 title = "Tree-structured programs", 12121 journal = j-CACM, 12122 volume = "16", 12123 number = "11", 12124 pages = "704--705", 12125 month = nov, 12126 year = "1973", 12127 CODEN = "CACMA2", 12128 ISSN = "0001-0782", 12129 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12130 acknowledgement = ack-nhfb, 12131 classcodes = "C4290 (Other computer theory); C6110 (Systems analysis and programming)", 12132 corpsource = "Tech. Univ., Berlin, West Germany", 12133 keywords = "compilers; control structures; data structures; fixpoints; flowcharts; goto statements; graphs; inductive assertion; least; program documentation; program flow; programming; programming language design; proof of programs; semantics of programming languages; structured programming; tree structure", 12134 treatment = "G General Review; P Practical", 12135} 12136 12137@Article{Salzer:1973:RSC, 12138 author = "Herbert E. Salzer", 12139 title = "A recurrence scheme for converting from one orthogonal expansion into another", 12140 journal = j-CACM, 12141 volume = "16", 12142 number = "11", 12143 pages = "705--707", 12144 month = nov, 12145 year = "1973", 12146 CODEN = "CACMA2", 12147 ISSN = "0001-0782", 12148 MRclass = "65D05 (65Q05)", 12149 MRnumber = "52 15956", 12150 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12151 acknowledgement = ack-nhfb, 12152 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 12153 keywords = "Chebyshev; Clenshaw recurrence; Hamming recurrence; numerical methods; orthogonal expansions; polynomials; recurrence; schemes; series; series (mathematics); series interconversion", 12154 treatment = "T Theoretical or Mathematical", 12155} 12156 12157@Article{Stenger:1973:AAS, 12158 author = "F. Stenger", 12159 title = "An algorithm for the approximate solution of {Wiener-Hopf} integral equations", 12160 journal = j-CACM, 12161 volume = "16", 12162 number = "11", 12163 pages = "708--710", 12164 month = nov, 12165 year = "1973", 12166 CODEN = "CACMA2", 12167 ISSN = "0001-0782", 12168 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12169 acknowledgement = ack-nhfb, 12170 classcodes = "B0290R (Integral equations); C4180 (Integral equations)", 12171 corpsource = "Univ. Utah, Salt Lake City, UT, USA", 12172 keywords = "algorithm; approximate solution; convolution; Hopf; integral equations; numerical methods; Wiener", 12173 treatment = "T Theoretical or Mathematical", 12174} 12175 12176@Article{Ehrlich:1973:SBE, 12177 author = "L. W. Ehrlich", 12178 title = "Solving the Biharmonic Equation in a Square: a Direct Versus a Semidirect Method", 12179 journal = j-CACM, 12180 volume = "16", 12181 number = "11", 12182 pages = "711--714", 12183 month = nov, 12184 year = "1973", 12185 CODEN = "CACMA2", 12186 ISSN = "0001-0782", 12187 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12188 bibsource = "Compendex database", 12189 abstract = "Two methods for solving the biharmonic equation are compared. One method is direct, using eigenvalue-eigenvector decomposition. The other method is iterative, solving a Poisson equation directly at each iteration.", 12190 acknowledgement = ack-nhfb, 12191 classcodes = "B0290P (Differential equations); C4170 (Differential equations)", 12192 classification = "723", 12193 corpsource = "Johns Hopkins Univ., Baltimore, MD, USA", 12194 journalabr = "Commun ACM", 12195 keywords = "biharmonic; biharmonic equation; compared; computer systems programming; decomposition; difference; difference equations; eigenvalues and eigenfunctions; eigenvector; equations; iterative; iterative methods; numerical methods; partial differential; Poisson equation; square", 12196 treatment = "T Theoretical or Mathematical", 12197} 12198 12199@Article{Couger:1973:CRU, 12200 author = "J. Daniel Couger", 12201 title = "Curriculum Recommendations for Undergraduate Programs in Information Systems", 12202 journal = j-CACM, 12203 volume = "16", 12204 number = "12", 12205 pages = "727--749", 12206 month = dec, 12207 year = "1973", 12208 CODEN = "CACMA2", 12209 ISSN = "0001-0782", 12210 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12211 abstract = "The need for education related to information systems in organizations is discussed, and a curriculum is proposed for an undergraduate program. Material necessary for such programs is identified, and courses incorporating it are specified.Detailed course descriptions are presented. Program organization and a problems of implementation are discussed.", 12212 acknowledgement = ack-nhfb, 12213 classcodes = "C0220 (Computing education and training); C0310 (EDP management); C6110 (Systems analysis and programming); C7100 (Business and administration)", 12214 keywords = "curriculum; education; information analysis; information systems; management information systems; management systems; recommendations; system design; systems analysis; undergraduate; undergraduate curricula", 12215 treatment = "B Bibliography; P Practical", 12216} 12217 12218@Article{Sibley:1973:DDM, 12219 author = "Edgar H. Sibley and Robert W. Taylor", 12220 title = "A Data Definition and Mapping Language", 12221 journal = j-CACM, 12222 volume = "16", 12223 number = "12", 12224 pages = "750--759", 12225 month = dec, 12226 year = "1973", 12227 CODEN = "CACMA2", 12228 ISSN = "0001-0782", 12229 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12230 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 12231 acknowledgement = ack-nhfb, 12232 annote = "Overview of data translation", 12233 classcodes = "C6120 (File organisation)", 12234 corpsource = "Univ. Michigan, Ann Arbor, MI, USA", 12235 keywords = "data base management; data definition language; data structures; data translation; file organisation; file translation; mapping language; storage allocation; storage structure; systems", 12236 treatment = "A Application; T Theoretical or Mathematical", 12237} 12238 12239@Article{Kubicek:1973:AAL, 12240 author = "M. Kubicek", 12241 title = "{ACM} Algorithm 470: Linear Systems with Almost Tridiagonal Matrix", 12242 journal = j-CACM, 12243 volume = "16", 12244 number = "12", 12245 pages = "760--761", 12246 month = dec, 12247 year = "1973", 12248 CODEN = "CACMA2", 12249 ISSN = "0001-0782", 12250 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12251 acknowledgement = ack-nhfb, 12252 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C7310 (Mathematics computing)", 12253 corpsource = "Tech. Univ., Praha, Czechoslovakia", 12254 keywords = "almost tridiagonal matrix; FAKUB; FORTRAN; linear systems; matrix algebra; program; sparse matrix; subroutines", 12255 treatment = "A Application; T Theoretical or Mathematical", 12256} 12257 12258@Article{Gautschi:1973:AAE, 12259 author = "W. Gautschi", 12260 title = "{ACM} Algorithm 471: Exponential Integrals", 12261 journal = j-CACM, 12262 volume = "16", 12263 number = "12", 12264 pages = "761--763", 12265 month = dec, 12266 year = "1973", 12267 CODEN = "CACMA2", 12268 ISSN = "0001-0782", 12269 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12270 acknowledgement = ack-nhfb, 12271 classcodes = "B0290M (Numerical integration and differentiation); C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 12272 corpsource = "Purdue Univ., Lafayette, IN, USA", 12273 keywords = "ALGOL; computation; continued fractions; exponential integrals; integration; recurrence relations; recursive; subroutine; subroutines", 12274 treatment = "A Application; T Theoretical or Mathematical", 12275} 12276 12277@Article{Herriot:1973:AAP, 12278 author = "J. G. Herriot and C. H. Reinsch", 12279 title = "{ACM} Algorithm 472: Procedures for Natural Spline Interpolation", 12280 journal = j-CACM, 12281 volume = "16", 12282 number = "12", 12283 pages = "763--768", 12284 month = dec, 12285 year = "1973", 12286 CODEN = "CACMA2", 12287 ISSN = "0001-0782", 12288 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12289 acknowledgement = ack-nhfb, 12290 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 12291 corpsource = "Stanford Univ., CA, USA", 12292 keywords = "approximation; cubic natural spline; interpolation; natural spline interpolation; procedures; splines (mathematics); subroutines", 12293 treatment = "A Application; T Theoretical or Mathematical", 12294} 12295 12296@Article{Lyon:1974:SLA, 12297 author = "G. Lyon", 12298 title = "Syntax-directed least-errors analysis for context-free languages: a practical approach", 12299 journal = j-CACM, 12300 volume = "17", 12301 number = "1", 12302 pages = "3--14", 12303 month = jan, 12304 year = "1974", 12305 CODEN = "CACMA2", 12306 ISSN = "0001-0782", 12307 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12308 acknowledgement = ack-nhfb, 12309 classcodes = "C4210 (Formal logic)", 12310 corpsource = "Nat. Bur. Stand., Washington, DC, USA", 12311 keywords = "arbitrary input strings; context free grammars; context-free languages; dynamic programming; error analysis; least errors correction; merging; parsing; separability; state; stored subanalyses", 12312 treatment = "T Theoretical or Mathematical", 12313} 12314 12315@Article{Malcolm:1974:FMS, 12316 author = "Michael A. Malcolm and John Palmer", 12317 title = "A Fast Method For Solving a Class of Tridiagonal Systems of Linear Equations", 12318 journal = j-CACM, 12319 volume = "17", 12320 number = "1", 12321 pages = "14--17", 12322 month = jan, 12323 year = "1974", 12324 CODEN = "CACMA2", 12325 ISSN = "0001-0782", 12326 MRclass = "65F05", 12327 MRnumber = "48 10076", 12328 mrreviewer = "D. B. Hunter", 12329 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12330 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 12331 abstract = "The solution of linear systems having real, symmetric, diagonally dominant,tridiagonal coefficient matrices with constant diagonals is considered. It is proved that the diagonals of the LU decomposition converges when floating-point precision. It is also proved that the computed LU decomposition converges when floating-point arithmetic is used and that the limits of the LU diagonals using floating point are roughly within machine precision of the limits using real arithmetic. This fact is exploited to reduce the number of floating-point operations required to solve a linear system from $8n-7$ to $5n+2k-3$, where $k$ is much less than $n$, the order of the matrix. If the elements of the subdiagonals and superdiagonals are 1, then only $4n+2k-3$ operations are needed. The entire LU decomposition takes $k$ words of storage, and considerable savings in array subscripting are achieved. Upper and lower bounds on $k$ are obtained in terms of the ratio of the coefficient matrix diagonal constants and parameters of the floating-point number system. Various generalizations of these results are discussed.", 12332 acknowledgement = ack-nhfb, 12333 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C5230 (Digital arithmetic methods)", 12334 corpsource = "Univ. Waterloo, Ont., Canada", 12335 keywords = "digital arithmetic; fast method; floating point; linear systems; matrix algebra; numerical linear algebra; operations; real arithmetic; Toeplitz matrices; tridiagonal matrices", 12336 kwds = "nla, linear system, tridiagonal matrix, fast algorithm", 12337 treatment = "T Theoretical or Mathematical", 12338 xxtitle = "A fast method for solving a class of tridiagonal linear systems", 12339} 12340 12341@Article{Akima:1974:MBI, 12342 author = "H. Akima", 12343 title = "A method of bivariate interpolation and smooth surface fitting based on local procedures", 12344 journal = j-CACM, 12345 volume = "17", 12346 number = "1", 12347 pages = "18--20", 12348 month = jan, 12349 year = "1974", 12350 CODEN = "CACMA2", 12351 ISSN = "0001-0782", 12352 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12353 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/pre75.bib", 12354 acknowledgement = ack-nhfb, 12355 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation)", 12356 corpsource = "US Dept. Commerce, Boulder, Colo., USA", 12357 keywords = "bivariate interpolation; interpolation; local; partial derivative; polynomial; procedures; smooth surface fitting", 12358 treatment = "T Theoretical or Mathematical", 12359} 12360 12361@Article{Gibbs:1974:TP, 12362 author = "Norman E. Gibbs and William G. {Poole, Jr.}", 12363 title = "Tridiagonalization by Permutations", 12364 journal = j-CACM, 12365 volume = "17", 12366 number = "1", 12367 pages = "20--24", 12368 month = jan, 12369 year = "1974", 12370 CODEN = "CACMA2", 12371 ISSN = "0001-0782", 12372 MRclass = "65F15", 12373 MRnumber = "48 7567", 12374 mrreviewer = "J. Hurt", 12375 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12376 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 12377 abstract = "Tridiagonalizing a matrix by similarity transformations is an important computational tool in numerical linear algebra. Consider the class of sparse matrices which can be tridiagonalized using only row and corresponding column permutations. The advantages of using such a transformation include the absence of round-off errors and improved computation time when compared with standard transformations. \par A graph theoretic algorithm which examines an arbitrary $n \times n$ matrix and determines whether or not it can be permuted into tridiagonal form is given. The algorithm requires no arithmetic while the number of comparisons, the number of assignments, and the number of increments are linear in $n$. This compares very favorably with standard transformation methods. \par If the matrix is permutable into tridiagonal form, the algorithm gives the explicit tridiagonal form. Otherwise, early rejection will occur.", 12378 acknowledgement = ack-nhfb, 12379 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 12380 corpsource = "College William and Mary, Williamsburg, VA, USA", 12381 keywords = "algorithm; bandwidth; eigenvalues; graph; matrix algebra; permutation; sparse matrix; tridiagonal matrix", 12382 kwds = "nla, tridiagonal matrix, permutation matrix", 12383 treatment = "T Theoretical or Mathematical", 12384} 12385 12386@Article{Piessens:1974:AAC, 12387 author = "R. Piessens", 12388 title = "{ACM} Algorithm 473: Computation of {Legendre} Series Coefficients", 12389 journal = j-CACM, 12390 volume = "17", 12391 number = "1", 12392 pages = "25--25", 12393 month = jan, 12394 year = "1974", 12395 CODEN = "CACMA2", 12396 ISSN = "0001-0782", 12397 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12398 acknowledgement = ack-nhfb, 12399 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 12400 corpsource = "Univ. Leuven, Heverlee, Belgium", 12401 keywords = "Chebyshev; Chebyshev approximation; coefficients; computation; FORTRAN; Legendre series; LEGSER; series; series (mathematics); subroutines", 12402 treatment = "A Application; T Theoretical or Mathematical", 12403} 12404 12405@Article{Akima:1974:AAB, 12406 author = "H. Akima", 12407 title = "{ACM} Algorithm 474: Bivariate Interpolation and Smooth Surface Fitting Based on Local Procedures", 12408 journal = j-CACM, 12409 volume = "17", 12410 number = "1", 12411 pages = "26--31", 12412 month = jan, 12413 year = "1974", 12414 CODEN = "CACMA2", 12415 ISSN = "0001-0782", 12416 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12417 note = "See also \cite{Anderson:1979:RBI}.", 12418 acknowledgement = ack-nhfb, 12419 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 12420 corpsource = "US Dept Commerce, Boulder, Colo., USA", 12421 keywords = "bivariate interpolation; FORTRAN; interpolation; ITPLBV; local; partial derivative; polynomial; procedures; SFCFIT; smooth surface fitting; subroutines", 12422 treatment = "A Application; T Theoretical or Mathematical", 12423} 12424 12425@Article{Sutherland:1974:RPC, 12426 author = "Ivan E. Sutherland and Gary W. Hodgman", 12427 title = "Reentrant Polygon Clipping", 12428 journal = j-CACM, 12429 volume = "17", 12430 number = "1", 12431 pages = "32--42", 12432 month = jan, 12433 year = "1974", 12434 CODEN = "CACMA2", 12435 ISSN = "0001-0782", 12436 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12437 acknowledgement = ack-nhfb, 12438 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques)", 12439 corpsource = "Evand and Sutherland Computer Corp., Salt Lake City, UT, USA", 12440 keywords = "algorithms; computer; computer graphics; data handling; graphics; hidden line; perspective; perspective projection; pictures; planes; polygon clipping; reentrant polygon clipping; surface; three dimensions", 12441 treatment = "A Application; T Theoretical or Mathematical", 12442} 12443 12444@Article{King:1974:CAV, 12445 author = "P. J. H. King and R. G. Johnson", 12446 title = "Comments on the algorithms of {Verhelst} for the conversion of limited-entry decision tables to flowcharts (and author's reply)", 12447 journal = j-CACM, 12448 volume = "17", 12449 number = "1", 12450 pages = "43--45", 12451 month = jan, 12452 year = "1974", 12453 CODEN = "CACMA2", 12454 ISSN = "0001-0782", 12455 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12456 acknowledgement = ack-nhfb, 12457 classcodes = "C6110 (Systems analysis and programming)", 12458 corpsource = "Birkbeck Coll., Univ. London, UK", 12459 keywords = "algorithms; conversion; decision table; decision tables; flow charting; flowcharting; optimal programs; preprocessor; search", 12460 treatment = "P Practical", 12461} 12462 12463@Article{Knott:1974:NSC, 12464 author = "Gary D. Knott", 12465 title = "A Numbering System for Combinations", 12466 journal = j-CACM, 12467 volume = "17", 12468 number = "1", 12469 pages = "45--46", 12470 month = jan, 12471 year = "1974", 12472 CODEN = "CACMA2", 12473 ISSN = "0001-0782", 12474 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12475 acknowledgement = ack-nhfb, 12476 classcodes = "C6110 (Systems analysis and programming)", 12477 corpsource = "Nat. Inst. Health, Bethesda, MD, USA", 12478 keywords = "coding system; coding systems; combinations; combinatorics; numbering system; programming; programming techniques; storage mapping function; storage mapping functions", 12479 treatment = "A Application; T Theoretical or Mathematical", 12480} 12481 12482@Article{Lucas:1974:CRG, 12483 author = "H. C. {Lucas, Jr.}", 12484 title = "A {CRT} report generating system", 12485 journal = j-CACM, 12486 volume = "17", 12487 number = "1", 12488 pages = "47--48", 12489 month = jan, 12490 year = "1974", 12491 CODEN = "CACMA2", 12492 ISSN = "0001-0782", 12493 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12494 acknowledgement = ack-nhfb, 12495 classcodes = "C6110 (Systems analysis and programming)", 12496 corpsource = "Stanford Univ., CA, USA", 12497 keywords = "automated systems design; data; management; processing; programming; report generation; report generators; systems analysis", 12498 treatment = "P Practical", 12499} 12500 12501@Article{Rothnie:1974:ABF, 12502 author = "James B. {Rothnie, Jr.} and Tomas Lozano", 12503 title = "Attribute Based File Organization in a Paged Memory Environment", 12504 journal = j-CACM, 12505 volume = "17", 12506 number = "2", 12507 pages = "63--69", 12508 month = feb, 12509 year = "1974", 12510 CODEN = "CACMA2", 12511 ISSN = "0001-0782", 12512 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12513 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib", 12514 abstract = "This article analyzes the high cost of page accessing and proposes a method called multiple key hashing which attempts to minimize it. since this approach is not always preferable to inversion, a combined method is described. The exact specifications of this combination for a file with given data and traffic characteristics are formulated as a mathematical program. The proposed heuristic solution to this program can often improve on a simple inversion technique by a factor of 2 or 3.", 12515 acknowledgement = ack-nhfb, 12516 classcodes = "C6120 (File organisation)", 12517 classification = "723", 12518 corpsource = "MIT, Cambridge, MA, USA", 12519 journalabr = "Commun ACM", 12520 keywords = "attribute based file organization; cost; data organization; data processing; data storage, digital; file organisation; file organization; heuristic solution; inverted file; mathematical; mathematical programming; multikey retrieval; multiple key hashing; page accessing; paged memories; paged memory environment; paging; program; retrieval algorithm; virtual storage", 12521 treatment = "A Application; E Economic; T Theoretical or Mathematical", 12522} 12523 12524@Article{Jordan:1974:COR, 12525 author = "B. W. {Jordan, Jr.} and R. C. Barrett", 12526 title = "A cell organized raster display for line drawings", 12527 journal = j-CACM, 12528 volume = "17", 12529 number = "2", 12530 pages = "70--77", 12531 month = feb, 12532 year = "1974", 12533 CODEN = "CACMA2", 12534 ISSN = "0001-0782", 12535 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12536 bibsource = "Compendex database", 12537 abstract = "Raster scan computer graphics displays with ``real time'' character generators have previously been limited to alphanumeric characters. A display is described which extends the capabilities of this organization to include general graphics. The feasibility of such a display is shown by deriving the minimum number of patterns required in the read only memory of the character generator to synthesize an arbitrary line. The synthesis process does not compromise picture quality, since the resulting dot patterns are identical with those of a conventional raster display. The time constraints of a raster display are shown to be satisfied for a typical design for very complex line drawings.", 12538 acknowledgement = ack-nhfb, 12539 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques)", 12540 classification = "722", 12541 corpsource = "Northwestern Univ., Evanston, IL, USA", 12542 journalabr = "Commun ACM", 12543 keywords = "arbitrary line; cell organized raster display; complex line drawings; computer; computer graphic equipment; computer graphics; computer peripheral equipment; discrete; dot; dot generation; graphics displays; image; line drawing; line drawings; matrix displays; minimum; number of patterns; patterns; read only memory; real time character generators", 12544 treatment = "P Practical", 12545} 12546 12547@Article{Ramberg:1974:AMG, 12548 author = "John S. Ramberg and Bruce W. Schmeiser", 12549 title = "An Approximate Method for Generating Asymmetric Random Variables", 12550 journal = j-CACM, 12551 volume = "17", 12552 number = "2", 12553 pages = "78--82", 12554 month = feb, 12555 year = "1974", 12556 CODEN = "CACMA2", 12557 ISSN = "0001-0782", 12558 MRclass = "65C10", 12559 MRnumber = "48 10043", 12560 mrreviewer = "J. Spanier", 12561 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12562 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib", 12563 abstract = "Tukey's lambda distribution is generalized to provide an algorithm for generating values of unimodal asymmetric random variables. This algorithm has the same advantages as the symmetric random variable generator previously given by the authors, except that the addition of another parameter complicates the problem of finding the parameter values to fit a distribution.", 12564 acknowledgement = ack-nhfb, 12565 classcodes = "C7890 (Other special applications of computing)", 12566 classification = "723; 922", 12567 corpsource = "Univ. Iowa, IA, USA", 12568 country = "USA", 12569 descriptors = "RNG; RVG;", 12570 enum = "2505", 12571 journalabr = "Commun ACM", 12572 keywords = "approximate method; approximations; computer programming --- Subroutines; distribution; generating asymmetric random variables; mathematical statistics; moments; Monte Carlo; Monte Carlo methods; probability; random number generation; random numbers; random variables; simulation; statistics; Tukey's lambda distribution; unimodal asymmetric random; variables", 12573 language = "English", 12574 treatment = "T Theoretical or Mathematical", 12575} 12576 12577@Article{Lamport:1974:PED, 12578 author = "Leslie Lamport", 12579 title = "The Parallel Execution of {DO} Loops", 12580 journal = j-CACM, 12581 volume = "17", 12582 number = "2", 12583 pages = "83--93", 12584 month = feb, 12585 year = "1974", 12586 CODEN = "CACMA2", 12587 ISSN = "0001-0782", 12588 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12589 bibsource = "Compendex database", 12590 abstract = "Methods are developed for the parallel execution of different iterations of a DO loop. Both asynchronous multiprocessor computers and array computers are considered. Practical application to the design of compilers for such computers is discussed.", 12591 acknowledgement = ack-nhfb, 12592 classcodes = "C6110 (Systems analysis and programming); C6150C (Compilers, interpreters and other processors)", 12593 classification = "722; 723", 12594 corpsource = "Massachusetts Computer Associates Inc., Wakefield, MA, USA", 12595 journalabr = "Commun ACM", 12596 keywords = "array computers; asynchronous multiprocessor; computer operating systems --- Program Compilers; computer systems, digital; computers; computing; design of compilers; DO loops; loops; parallel; parallel execution; parallel processing; program compilers; programming; vector computers", 12597 treatment = "A Application; T Theoretical or Mathematical", 12598} 12599 12600@Article{Ledgard:1974:PSC, 12601 author = "Henry F. Ledgard", 12602 title = "{Production Systems}: or can we do better than {BNF}?", 12603 journal = j-CACM, 12604 volume = "17", 12605 number = "2", 12606 pages = "94--102", 12607 month = feb, 12608 year = "1974", 12609 CODEN = "CACMA2", 12610 ISSN = "0001-0782", 12611 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12612 bibsource = "Compendex database", 12613 abstract = "Since the development of BNF, the definition of the syntax of programming languages has been almost universally associated with context-free requirements. \par Yet numerous interesting and difficult issues in syntax stem from the context-sensitive requirements, notably the compatibility between the declaration of an identifier and its uses, the correspondence between actual and formal parameters, and issues arising from block structure. This paper explores the use of a formal notation called Production Systems in providing a readable and complete formal definition of syntax. As a practical illustration, a small but significant subset of PL/I is considered. A more detailed presentation, as well as the application to define abstract syntax and translations between languages, is given in a previous paper by the author.", 12614 acknowledgement = ack-nhfb, 12615 classcodes = "C4210 (Formal logic)", 12616 classification = "721; 723", 12617 corpsource = "Univ. Massachusetts, Amherst, MA, USA", 12618 journalabr = "Commun ACM", 12619 keywords = "automata theory; BNF; compilers; computer programming languages; context sensitive grammars; context sensitive requirements; context-sensitive grammars; definition; definition of syntax; formal; formal definition; PL/I standards; Production Systems; readable and complete formal; syntax; syntax of programming languages; translation", 12620 treatment = "A Application; T Theoretical or Mathematical", 12621} 12622 12623@Article{Wegbreit:1974:SLP, 12624 author = "Ben Wegbreit", 12625 title = "The Synthesis of Loop Predicates", 12626 journal = j-CACM, 12627 volume = "17", 12628 number = "2", 12629 pages = "102--112", 12630 month = feb, 12631 year = "1974", 12632 CODEN = "CACMA2", 12633 ISSN = "0001-0782", 12634 MRclass = "68A05", 12635 MRnumber = "49 8420", 12636 mrreviewer = "Armin Cremers", 12637 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12638 bibsource = "Compendex database", 12639 abstract = "Current methods for mechanical program verification require a complete predicate specification on each loop. Because this is tedious and error prone, producing a program with complete, correct predicates is reasonably difficult and would be facilitated by machine assistance. This paper discusses techniques for mechanically synthesizing loop predicates. Two classes of techniques are considered: (1) heuristic methods which derive loop predicates from boundary conditions and/or partially specified inductive assertions: (2) extraction methods which use input predicates and appropriate weak interpretations to obtain certain classes of loop predicates by an evaluation on the weak interpretation.", 12640 acknowledgement = ack-nhfb, 12641 classcodes = "C4240 (Programming and algorithm theory); C6150G (Diagnostic, testing, debugging and evaluating systems)", 12642 classification = "721; 723", 12643 corpsource = "Harvard Univ., Cambridge, MA, USA", 12644 journalabr = "Commun ACM", 12645 keywords = "assertions; automata theory --- Theorem Proving; boundary conditions; computer operating systems; computer programming; extraction methods; heuristic methods; inductive; inductive assertions; input predicates; interpretations; loop predicates; mechanical program verification; program debugging; program verification; program verifiers; programming theory; property extraction; synthesis; synthesis of loop predicates; theorem proving; weak; weak interpretation; weak interpretations; well founded sets; well-founded sets", 12646 treatment = "A Application; T Theoretical or Mathematical", 12647} 12648 12649@Article{Sreenivasan:1974:CRS, 12650 author = "K. Sreenivasan and A. J. Kleinman", 12651 title = "On the Construction of a Representative Synthetic Workload", 12652 journal = j-CACM, 12653 volume = "17", 12654 number = "3", 12655 pages = "127--133", 12656 month = mar, 12657 year = "1974", 12658 CODEN = "CACMA2", 12659 ISSN = "0001-0782", 12660 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12661 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 12662 abstract = "A general method of constructing a drive workload representative of a real workload is described. The real workload is characterized by its demands on the various system resources. These characteristics of the real workload are obtained from the system accounting data. The characteristics of the drive workload are determined by matching the joint probability density of the real workload with that of the drive workload. The drive workload is realized by using a synthetic program in which the characteristics can be varied by varying the appropriate parameters. Calibration experiments are conducted to determine expressions relating the synthetic program parameters with the workload characteristics. The general method is applied to the case of two variables, cpu seconds and number of I/O activities; and a synthetic workload with 88 jobs is constructed to represent a month's workload consisting of about 6000 jobs.", 12663 acknowledgement = ack-nhfb, 12664 classcodes = "C6150G (Diagnostic, testing, debugging and evaluating systems); C7430 (Computer engineering)", 12665 classification = "722", 12666 corpsource = "MITRE Corp., Bedford, MA, USA", 12667 journalabr = "Commun ACM", 12668 keywords = "activities; calibration experiments; computer systems, digital; computer testing; construction; cpu seconds; data; drive; joint probability density; number of I/O; real workload; representative synthetic workload; simulation; synthetic program; synthetic workload; system accounting; system resources; workload", 12669 treatment = "P Practical", 12670} 12671 12672@Article{Balkovich:1974:DMR, 12673 author = "E. Balkovich and W. Chiu and L. Presser and R. Wood", 12674 title = "Dynamic Memory Repacking", 12675 journal = j-CACM, 12676 volume = "17", 12677 number = "3", 12678 pages = "133--138", 12679 month = mar, 12680 year = "1974", 12681 CODEN = "CACMA2", 12682 ISSN = "0001-0782", 12683 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12684 bibsource = "Compendex database", 12685 abstract = "A probabilistic model of a multiprogramming system is exercised in order to determine the conditions under which the dynamic repacking of main memory is beneficial. An expression is derived for the maximum interference that a repacking process may introduce before the original performance of the system is degraded. Alternative approaches to repacking are discussed, and the operating conditions that lead to improved system throughput through repacking are delineated.", 12686 acknowledgement = ack-nhfb, 12687 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 12688 classification = "723", 12689 corpsource = "Univ. California, Santa Barbara, CA, USA", 12690 journalabr = "Commun ACM", 12691 keywords = "central; computer systems programming; dynamic memory repacking; file organisation; fragmentation; maximum interference; multiprogramming; multiprogramming system; multiprogramming system model; probabilistic model; processor productivity; resource utilization; storage; storage fragmentation; system; throughput", 12692 treatment = "A Application; T Theoretical or Mathematical", 12693} 12694 12695@Article{Morgan:1974:OSA, 12696 author = "Howard Lee Morgan", 12697 title = "Optimal Space Allocation on Disk Storage Devices", 12698 journal = j-CACM, 12699 volume = "17", 12700 number = "3", 12701 pages = "139--142", 12702 month = mar, 12703 year = "1974", 12704 CODEN = "CACMA2", 12705 ISSN = "0001-0782", 12706 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12707 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 12708 abstract = "When the amount of space required for file storage exceeds the amount which can be kept online, decisions must be made as to which files are to be permanently resident and which mountable. These decisions will affect the number of mount requests issued to the operators. This is often a bottleneck in a computing facility, and reducing the number of mounts thus decreases turnaround time. An optimization model for the assignment of files to disk packs, and packs to either resident or nonresident status is presented. Heuristics are suggested for those cases in which it is inefficient to compute the actual optimum.", 12709 acknowledgement = ack-nhfb, 12710 annote = "Optimization of file allocation to mountable diskpacks.", 12711 classcodes = "C6120 (File organisation)", 12712 classification = "723", 12713 corpsource = "California Inst. Technol., Pasadena, CA, USA", 12714 journalabr = "Commun ACM", 12715 keywords = "bottleneck; computer operating systems; computing facility; disc analysis; disc files; disc storage devices; file; file systems; Heuristics; magnetic disc storage; memory hierarchy; optimal space allocation; optimization model; scheduling; storage; storage allocation", 12716 treatment = "T Theoretical or Mathematical", 12717} 12718 12719@Article{Loeser:1974:SPT, 12720 author = "Rudolf Loeser", 12721 title = "Some Performance Tests of ``Quicksort'' and Descendants", 12722 journal = j-CACM, 12723 volume = "17", 12724 number = "3", 12725 pages = "143--152", 12726 month = mar, 12727 year = "1974", 12728 CODEN = "CACMA2", 12729 ISSN = "0001-0782", 12730 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12731 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 12732 abstract = "Detailed performance evaluations are presented for six ACM algorithms: quicksort (No. 64), Shellsort (No. 201), stringsort (No. 207), ``TREESORTS3'' (No. 245), quickersort (No. 271), and qsort (No. 402). Algorithms 271 and 402 are refinements of algorithm 64, and all three are discussed in some detail. The evidence given here demonstrates that qsort (No. 402) requires many more comparisons that its author claims. Of all these algorithms, quickersort requires the fewest comparisons to sort random arrays.", 12733 acknowledgement = ack-nhfb, 12734 classcodes = "C6130 (Data handling techniques); C6150G (Diagnostic, testing, debugging and evaluating systems)", 12735 classification = "723", 12736 corpsource = "Smithsonian Astrophys. Obs., Cambridge, MA, USA", 12737 journalabr = "Commun ACM", 12738 keywords = "'quicksort'; ACM; algorithms; computer programming; computer testing; general; performance evaluations; performance tests; purpose sort algorithm; qsort; quicksort; quicksort quickersort qsort CACM; random arrays; Shellsort; sorting; sorting algorithm documentation; sorting efficiency; sorting performance tests; string sort; TREESORT3; utility sort algorithm", 12739 treatment = "P Practical", 12740} 12741 12742@Article{Wright:1974:VSP, 12743 author = "T. Wright", 12744 title = "Visible surface plotting program", 12745 journal = j-CACM, 12746 volume = "17", 12747 number = "3", 12748 pages = "152--157 (or 152--155??)", 12749 month = mar, 12750 year = "1974", 12751 CODEN = "CACMA2", 12752 ISSN = "0001-0782", 12753 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12754 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1972.bib", 12755 note = "See also \cite{Duta:1976:RVS,Swieten:1979:RVS}.", 12756 acknowledgement = ack-nhfb, 12757 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques)", 12758 corpsource = "Nat. Center Atmospheric Res., Boulder, CO, USA", 12759 country = "USA", 12760 descriptors = "FORTRAN; graphics; application; method; human factors; hidden line algorithm; contour surface", 12761 enum = "3343", 12762 keywords = "computer graphics; contour surface; hidden line problem; subroutines; visible surface plotting program", 12763 language = "English", 12764 references = "0", 12765 treatment = "P Practical", 12766} 12767 12768@Article{Bosten:1974:IBR, 12769 author = "N. E. Bosten and E. L. Battiste", 12770 title = "Incomplete beta ratio", 12771 journal = j-CACM, 12772 volume = "17", 12773 number = "3", 12774 pages = "156--157", 12775 month = mar, 12776 year = "1974", 12777 CODEN = "CACMA2", 12778 ISSN = "0001-0782", 12779 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12780 acknowledgement = ack-nhfb, 12781 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 12782 corpsource = "IMSL, Houston, TX, USA", 12783 keywords = "Algorithm 179; computer aided analysis; function approximation; incomplete beta ratio; subroutines", 12784 treatment = "T Theoretical or Mathematical", 12785} 12786 12787@Article{Barrett:1974:SCA, 12788 author = "R. C. Barrett and B. W. {Jordan, Jr.}", 12789 title = "Scan Conversion Algorithms for a Cell Organized Raster Display", 12790 journal = j-CACM, 12791 volume = "17", 12792 number = "3", 12793 pages = "157--163", 12794 month = mar, 12795 year = "1974", 12796 CODEN = "CACMA2", 12797 ISSN = "0001-0782", 12798 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12799 bibsource = "Compendex database", 12800 abstract = "Raster scan computer graphics with ``real time'' character generators have previously been limited to alphanumeric characters. A display has been described which extends the capabilities of this organization to include general graphics. Two fundamentally different scan conversion algorithms which have been developed to support this display are presented. One is most suitable to noninteractive applications and the other to interactive applications. The algorithms were implemented in Fortran on the CDC6400 computer. Results obtained from the implementations show that the noninteractive algorithms can significantly reduce display file storage requirements at little cost in execution time over that of a conventional raster display. The interactive algorithm improve response time and reduce storage requirements.", 12801 acknowledgement = ack-nhfb, 12802 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques)", 12803 classification = "723", 12804 corpsource = "Hughes Aircraft Co., Culver City, CA, USA", 12805 journalabr = "Commun ACM", 12806 keywords = "'real time' character generators; cell organized raster display; computer graphics; computer programming --- Subroutines; data handling; general graphics; interactive applications; noninteractive applications; scan conversion algorithms", 12807 treatment = "A Application; P Practical", 12808} 12809 12810@Article{Ackerman:1974:QSH, 12811 author = "A. Frank Ackerman", 12812 title = "Quadratic Search for Hash Tables of Size $p^n$", 12813 journal = j-CACM, 12814 volume = "17", 12815 number = "3", 12816 pages = "164--164", 12817 month = mar, 12818 year = "1974", 12819 CODEN = "CACMA2", 12820 ISSN = "0001-0782", 12821 MRclass = "68A05", 12822 MRnumber = "48 10178", 12823 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12824 acknowledgement = ack-nhfb, 12825 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 12826 keywords = "file organisation; quadratic search for hash tables; table lookup", 12827 treatment = "T Theoretical or Mathematical", 12828} 12829 12830@Article{Stone:1974:NCP, 12831 author = "Harold S. Stone", 12832 title = "A note on a combinatorial problem of {Burnett} and {Coffman}", 12833 journal = j-CACM, 12834 volume = "17", 12835 number = "3", 12836 pages = "165--166", 12837 month = mar, 12838 year = "1974", 12839 CODEN = "CACMA2", 12840 ISSN = "0001-0782", 12841 MRclass = "05A05", 12842 MRnumber = "48 10826", 12843 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12844 acknowledgement = ack-nhfb, 12845 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics); C6130 (Data handling techniques)", 12846 corpsource = "Stanford Univ., CA, USA", 12847 keywords = "combinatorial analysis; combinatorial mathematics; combinatorial problem; derangements; file organisation; interleaved memory systems; interleaving; mean; memories; memory bandwidth; rencontres", 12848 treatment = "T Theoretical or Mathematical", 12849} 12850 12851@Article{Krogh:1974:EIV, 12852 author = "Fred T. Krogh", 12853 title = "Efficient Implementation of a Variable Projection Algorithm for Nonlinear Least Squares Problems", 12854 journal = j-CACM, 12855 volume = "17", 12856 number = "3", 12857 pages = "167--169", 12858 month = mar, 12859 year = "1974", 12860 CODEN = "CACMA2", 12861 ISSN = "0001-0782", 12862 MRclass = "65K05", 12863 MRnumber = "49 1773", 12864 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12865 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 12866 note = "See errata \cite{Krogh:1974:EEI}.", 12867 abstract = "Nonlinear least squares problems frequently arise for which the variables to be solved for can be separated into a linear and a nonlinear part. A variable projection algorithm has been developed recently which is designed to take advantage of the structure of a problem whose variables separate in this way. This paper gives a slightly more efficient and slightly more general version of this algorithm than has appeared earlier.", 12868 acknowledgement = ack-nhfb, 12869 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 12870 classification = "723; 921", 12871 corpsource = "California Inst. Technol., Pasadena, CA, USA", 12872 journalabr = "Commun ACM", 12873 keywords = "computer aided analysis; computer programming; least squares approximations; lsq; mathematical techniques --- Least Squares Approximations; nllsq; nlop; nlsq; nonlinear least squares; parameter estimation; problems; variable projection; variable projection algorithm; varpro", 12874 treatment = "T Theoretical or Mathematical", 12875} 12876 12877@Article{Saltzer:1974:SLM, 12878 author = "Jerome H. Saltzer", 12879 title = "A Simple Linear Model of Demand Paging Performance", 12880 journal = j-CACM, 12881 volume = "17", 12882 number = "4", 12883 pages = "181--186", 12884 month = apr, 12885 year = "1974", 12886 CODEN = "CACMA2", 12887 ISSN = "0001-0782", 12888 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12889 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/storage.bib and ftp://ftp.ira.uka.de/pub/bibliography/Misc/cache.bib", 12890 abstract = "This paper proposes and analyzes a demand paged virtual memory computer system. The simple model combines the effect of the information reference pattern with the effect of the automatic management algorithm to produce a single, composite statement: the mean number of memory references between paging exceptions increases linearly with the size of the paging memory. The resulting model is easy to manipulate, and is applicable to such diverse problems as choosing an optimum size for a paging memory, arranging for reproducible memory usage charges, and estimating the amount of core memory sharing.", 12891 acknowledgement = ack-nhfb, 12892 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 12893 classification = "723", 12894 corpsource = "MIT, Cambridge, MA, USA", 12895 journalabr = "Commun ACM", 12896 keywords = "automatic management algorithm; automatically managed multilevel memory system; computer metatheory; computer testing; core memory; demand paging performance; information; linear model; memory hierarchy; memory models; operating systems (computers); optimum; paging; performance; Performance Evaluation: Analytic; performance measurement; predicting the; program reference model; reference pattern; reproducible memory usage charges; sharing; size; storage; virtual; virtual memory", 12897 treatment = "A Application; X Experimental", 12898} 12899 12900@Article{Franklin:1974:CPF, 12901 author = "M. A. Franklin and R. K. Gupta", 12902 title = "Computation of Page Fault Probability from Program Transition Diagram", 12903 journal = j-CACM, 12904 volume = "17", 12905 number = "4", 12906 pages = "186--191", 12907 month = apr, 12908 year = "1974", 12909 CODEN = "CACMA2", 12910 ISSN = "0001-0782", 12911 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12912 bibsource = "Compendex database", 12913 abstract = "An algorithm is given for calculating page fault probability in a virtual memory system operating under demand paging with various memory sizes and replacement rules. A first order Markov model of program behavior is assumed, and a representation of the system based on memory states, control states, and memory substates is presented. The algorithm is general in the sense that the page fault probabilities can be calculated for nonpredictive replacement rules applied to any program represented by a one-step Markov chain. A detailed example is given to illustrate the algorithm for Random and Least Recently Used (LRU) replacement rules.", 12914 acknowledgement = ack-nhfb, 12915 classcodes = "C6120 (File organisation); C7430 (Computer engineering)", 12916 classification = "723", 12917 corpsource = "Washington Univ., St. Louis, MO, USA", 12918 journalabr = "Commun ACM", 12919 keywords = "computer metatheory; computer testing; control states; demand paging; fault tolerant computing; Markov model; memory; memory states; memory substates; nonpredictive replacement rules; page fault probability; program transition diagram; various memory sizes; virtual; virtual storage", 12920 treatment = "T Theoretical or Mathematical", 12921} 12922 12923@Article{Boyse:1974:ECP, 12924 author = "John W. Boyse", 12925 title = "Execution Characteristics of Programs in a Page-On-Demand System", 12926 journal = j-CACM, 12927 volume = "17", 12928 number = "4", 12929 pages = "192--196", 12930 month = apr, 12931 year = "1974", 12932 CODEN = "CACMA2", 12933 ISSN = "0001-0782", 12934 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12935 bibsource = "Compendex database", 12936 abstract = "Data are presented which show the execution characteristics of two types of commonly used programs in a large-scale, time-shared computer system. A software monitoring facility built into the supervisor was used for data collection during normal system operation. These data were analyzed, and results of this analysis are presented for a FORTRAN compiler and an interactive line file editor. Probability distribution functions and other data are given for such things as CPU intervals, I/O intervals, and the number of such intervals during execution. Empirical distributions are compared with simple theoretical distributions (exponential, hyperexponential, and geometric). Other data show paging characteristics of tasks as a function of the number of pages those tasks have in core.", 12937 acknowledgement = ack-nhfb, 12938 classcodes = "C6120 (File organisation); C6150C (Compilers, interpreters and other processors); C6150G (Diagnostic, testing, debugging and evaluating systems); C6150J (Operating systems)", 12939 classification = "723", 12940 corpsource = "Univ. Michigan, Ann Arbor, MI, USA", 12941 journalabr = "Commun ACM", 12942 keywords = "characteristics; compiler execution behaviour; computer metatheory; computer testing; CPU intervals; demand paging; editor; execution behaviour; Fortran compiler; I/O intervals; interactive line file; large scale, time shared computer system; monitoring facility; page on demand system; paging characteristics; probability distribution functions; program behaviour; program execution; software; supervisory and executive programs; virtual memory; virtual storage", 12943 treatment = "A Application; P Practical", 12944} 12945 12946@Article{Smith:1974:LCE, 12947 author = "Graham Smith and Ian M. Sefton", 12948 title = "On {Lions}' Counter Example for {Gotlieb}'s Method for the Construction of School Timetables", 12949 journal = j-CACM, 12950 volume = "17", 12951 number = "4", 12952 pages = "196--197", 12953 month = apr, 12954 year = "1974", 12955 CODEN = "CACMA2", 12956 ISSN = "0001-0782", 12957 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12958 bibsource = "Compendex database", 12959 abstract = "The timetable problem is an essentially discrete problem. Although the discrete problem may have no feasible solution, there may exist a solution to the equivalent continuous problem. An example is given, for which the nondiscrete solution can be interpreted as a set of timetables, differing from week to week, which together satisfy the long-term requirements of the timetable problem.", 12960 acknowledgement = ack-nhfb, 12961 classcodes = "C7110 (Educational administration); C7890 (Other special applications of computing)", 12962 classification = "921", 12963 corpsource = "Univ. New South Wales, Kensington, NSW, Australia", 12964 journalabr = "Commun ACM", 12965 keywords = "combinatorial; combinatorial mathematics; discrete problem; educational administrative data; Gotlieb's method; mathematical programming; multiindex problem; processing; schedule; scheduling; school timetables; timetable", 12966 treatment = "A Application; T Theoretical or Mathematical", 12967} 12968 12969@Article{Lindstrom:1974:CLS, 12970 author = "Gary Lindstrom", 12971 title = "Copying List Structures Using Bounded Workspace", 12972 journal = j-CACM, 12973 volume = "17", 12974 number = "4", 12975 pages = "198--202", 12976 month = apr, 12977 year = "1974", 12978 CODEN = "CACMA2", 12979 ISSN = "0001-0782", 12980 bibdate = "Tue Mar 25 13:26:09 MST 1997", 12981 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 12982 abstract = "Two new algorithms are presented for list structure copying using bounded workspace. The first, of primarily theoretical interest, shows that without cell tag bits the task can be performed in time n**2. The second algorithm, assuming one tag bit in each cell, delivers attractive practical speed. Any noncyclic structure is copied in linear speed, while cyclic structures are copied in average time less than n log n. No foreknowledge of cycle absence is necessary to achieve linear speed. A variation of the second algorithm solves an open problem concerning list structure marking. That result demonstrates that marking can be done in average time n log n without the aid of supplemental tag bits or stacks.", 12983 acknowledgement = ack-nhfb, 12984 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 12985 classification = "723", 12986 corpsource = "Univ. Pittsburgh, PA, USA", 12987 journalabr = "Commun ACM", 12988 keywords = "algorithms; bounded workspace; complexity; computer programming; copying list structures; cyclic; data structures; list; list processing; list structure marking; noncyclic structure; one tag bit; space; structure copying; structures", 12989 treatment = "T Theoretical or Mathematical", 12990} 12991 12992@Article{Even:1974:PTS, 12993 author = "Shimon Even", 12994 title = "Parallelism in Tape-Sorting", 12995 journal = j-CACM, 12996 volume = "17", 12997 number = "4", 12998 pages = "202--204", 12999 month = apr, 13000 year = "1974", 13001 CODEN = "CACMA2", 13002 ISSN = "0001-0782", 13003 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13004 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 13005 abstract = "Two methods for employing parallelism in tape-sorting are presented. Method A is the natural way to use parallelism. Method B is new. Both approximately achieve the goal of reducing the processing time by a divisor which is the number of processors.", 13006 acknowledgement = ack-nhfb, 13007 classcodes = "C6130 (Data handling techniques)", 13008 classification = "723", 13009 corpsource = "Weizmann Inst. Sci., Rehovot, Israel", 13010 journalabr = "Commun ACM", 13011 keywords = "computer systems programming", 13012 keywords = "external sorting; parallel processing; parallelism; queues; reducing the processing time; sorting; stacks; tape sorting", 13013 treatment = "A Application; T Theoretical or Mathematical", 13014} 13015 13016@Article{Lucas:1974:SCU, 13017 author = "H. C. {Lucas, Jr.} and D. B. Montgomery and J. C. Larreche", 13018 title = "A study of computer use in a graduate school of business", 13019 journal = j-CACM, 13020 volume = "17", 13021 number = "4", 13022 pages = "205--206", 13023 month = apr, 13024 year = "1974", 13025 CODEN = "CACMA2", 13026 ISSN = "0001-0782", 13027 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13028 acknowledgement = ack-nhfb, 13029 classcodes = "C0220 (Computing education and training); C7100 (Business and administration)", 13030 corpsource = "Stanford Univ., CA, USA", 13031 keywords = "accounting records; commerce; computer aided instruction; computer use; cumulative; curriculum; education; general problem solving tool; graduate school of business; process model; questionnaires; research", 13032 treatment = "G General Review", 13033} 13034 13035@Article{Freeman:1974:GEP, 13036 author = "Peter Freeman and Michael A. Malcolm and William H. Payne", 13037 title = "Graduate Education: The {Ph.D.} Glut: Response and Rebuttal", 13038 journal = j-CACM, 13039 volume = "17", 13040 number = "4", 13041 pages = "206--207", 13042 month = apr, 13043 year = "1974", 13044 CODEN = "CACMA2", 13045 ISSN = "0001-0782", 13046 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13047 note = "See \cite{Payne:1973:GEP}.", 13048 acknowledgement = ack-nhfb, 13049 classcodes = "C0310 (EDP management)", 13050 corpsource = "Univ. California, Irvine, CA, USA", 13051 keywords = "accreditation; advanced degrees; education; graduate education; Ph.D.; Ph.D. production; response and rebutted; what kind", 13052 treatment = "G General Review", 13053} 13054 13055@Article{Sterling:1974:ITM, 13056 author = "T. D. Sterling and S. V. Pollack", 13057 title = "Ideal teaching machines --- a solution to the pedagogic language problem", 13058 journal = j-CACM, 13059 volume = "17", 13060 number = "4", 13061 pages = "207--208", 13062 month = apr, 13063 year = "1974", 13064 CODEN = "CACMA2", 13065 ISSN = "0001-0782", 13066 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13067 acknowledgement = ack-nhfb, 13068 classcodes = "C0220 (Computing education and training); C6140D (High level languages)", 13069 corpsource = "Simon Fraser Univ., Burnaby, BC, Canada", 13070 keywords = "computer; education; ideal teaching machine; pedagogic language problem; problem oriented languages; simulated; teaching machines", 13071 treatment = "A Application; G General Review; P Practical", 13072} 13073 13074@Article{Abrahams:1974:SRL, 13075 author = "P. W. Abrahams", 13076 title = "Some remarks on lookup of structured variables", 13077 journal = j-CACM, 13078 volume = "17", 13079 number = "4", 13080 pages = "209--210", 13081 month = apr, 13082 year = "1974", 13083 CODEN = "CACMA2", 13084 ISSN = "0001-0782", 13085 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13086 acknowledgement = ack-nhfb, 13087 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 13088 corpsource = "New York Univ., NY, USA", 13089 keywords = "compilers; data structures; deterministic; finite state machine; lookup of structured variables; qualified references; sequence of identifiers; structured; symbol table; table lookup; variables", 13090 treatment = "G General Review; P Practical", 13091} 13092 13093@Article{Balfour:1974:AAM, 13094 author = "A. Balfour", 13095 title = "An alternative approach to mutual recursion {in Algol} 60 using restricted compilers", 13096 journal = j-CACM, 13097 volume = "17", 13098 number = "4", 13099 pages = "210--210", 13100 month = apr, 13101 year = "1974", 13102 CODEN = "CACMA2", 13103 ISSN = "0001-0782", 13104 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13105 acknowledgement = ack-nhfb, 13106 classcodes = "C6140D (High level languages); C6150C (Compilers, interpreters and other processors)", 13107 corpsource = "Heriot-Watt Univ., Edinburgh, UK", 13108 keywords = "ALGOL; Algol 60; compiler; mutual recursion; program compilers; restricted compilers; restrictions", 13109 treatment = "P Practical", 13110} 13111 13112@Article{Lee:1974:IPS, 13113 author = "R. C. T. Lee and C. L. Chang and R. J. Waldinger", 13114 title = "An Improved Program-Synthesizing Algorithm and its Correctness", 13115 journal = j-CACM, 13116 volume = "17", 13117 number = "4", 13118 pages = "211--217", 13119 month = apr, 13120 year = "1974", 13121 CODEN = "CACMA2", 13122 ISSN = "0001-0782", 13123 MRclass = "68A05 (68A40)", 13124 MRnumber = "49 10175", 13125 mrreviewer = "S. Amarel", 13126 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13127 bibsource = "Compendex database", 13128 abstract = "An improved program-synthesizing algorithm based on the algorithm proposed by Waldinger and Lee in 1969 is given. In the old algorithm, the program-synthesizing problem is translated into a theorem-proving problem, and a program is obtained by analyzing a proof. \par For the improved algorithm, the analysis is not necessary, and a program is obtained as soon as the proof is completed. This is achieved by using a modified variable tracing mechanism invented by Green in 1969. The correctness of the improved algorithm is also proved; i.e. the program thus obtained always satisfies the specification.", 13129 acknowledgement = ack-nhfb, 13130 classcodes = "C4240 (Programming and algorithm theory)", 13131 classification = "723", 13132 corpsource = "Nat. Inst. Health, Bethesda, MD, USA", 13133 journalabr = "Commun ACM", 13134 keywords = "computer metatheory; consequence finding; primitive resolutions; program-synthesizing algorithms; theorem proving", 13135 keywords = "consequence; correctness; finding; modified variable tracing mechanism; primitive resolutions; problem; program synthesizing algorithm; programming theory; theorem proving", 13136 treatment = "T Theoretical or Mathematical", 13137} 13138 13139@Article{Cline:1974:SPV, 13140 author = "A. K. Cline", 13141 title = "Scalar- and planar-valued curve fitting using splines under tension. {I}", 13142 journal = j-CACM, 13143 volume = "17", 13144 number = "4", 13145 pages = "218--220", 13146 month = apr, 13147 year = "1974", 13148 CODEN = "CACMA2", 13149 ISSN = "0001-0782", 13150 MRclass = "65D05", 13151 MRnumber = "49 8274", 13152 mrreviewer = "J. W. Jerome", 13153 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13154 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/pre75.bib", 13155 abstract = "The spline under tension was introduced by Schweikert in an attempt to imitate cubic splines but avoid the spurious critical points they induce. The defining equations are presented here, together with an efficient method for determining the necessary parameters and computing the resultant spline. The standard scalar-valued curve fitting problem is discussed, as well as the fitting of open and closed curves in the plane. The use of these curves and the importance of the tension in the fitting of contour lines are mentioned as application.", 13156 acknowledgement = ack-nhfb, 13157 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation)", 13158 classification = "921", 13159 corpsource = "Nat. Center Atmospheric Res., Boulder, CO, USA", 13160 country = "USA", 13161 descriptors = "Realization; polynomial; approximation; method; interpolation; FORTRAN; graphics; iterative method; information system; spline; curve fitting;", 13162 enum = "597", 13163 journalabr = "Commun ACM", 13164 keywords = "contouring; cubic splines; curve fitting; curves in the plane; fitting; function approximation; interpolation; scalar valued curve; splines (mathematics); splines under tension", 13165 keywords = "contouring; curve fitting; interpolation; mathematical techniques; splines", 13166 language = "English", 13167 references = "3", 13168 treatment = "T Theoretical or Mathematical", 13169} 13170 13171@Article{Cline:1974:AAS, 13172 author = "A. K. Cline", 13173 title = "{ACM} Algorithm 476: Six Subprograms for Curve Fitting Using Splines Under Tension", 13174 journal = j-CACM, 13175 volume = "17", 13176 number = "4", 13177 pages = "220--223 (or 220--221??)", 13178 month = apr, 13179 year = "1974", 13180 CODEN = "CACMA2", 13181 ISSN = "0001-0782", 13182 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13183 acknowledgement = ack-nhfb, 13184 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 13185 corpsource = "Nat. Center Atmospheric Res., Boulder, CO, USA", 13186 keywords = "contouring; curve fitting; FORTRAN; function approximation; interpolation; splines (mathematics); splines under tension; subprograms; subroutines", 13187 treatment = "A Application; T Theoretical or Mathematical", 13188} 13189 13190@Article{Ehrlich:1974:AAG, 13191 author = "G. Ehrlich", 13192 title = "{ACM} Algorithm 477: Generator of Set-Partitions to Exactly ${R}$ Subsets", 13193 journal = j-CACM, 13194 volume = "17", 13195 number = "4", 13196 pages = "224--225", 13197 month = apr, 13198 year = "1974", 13199 CODEN = "CACMA2", 13200 ISSN = "0001-0782", 13201 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13202 acknowledgement = ack-nhfb, 13203 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics); C7310 (Mathematics computing)", 13204 corpsource = "Weizmann Inst. Sci., Rehovot, Israel", 13205 keywords = "mutually exclusive subsets; PARTEXACT; partitions; permutations; set theory; subroutines; subset generation; subsets", 13206 treatment = "A Application; T Theoretical or Mathematical", 13207} 13208 13209@Article{Einarsson:1974:STE, 13210 author = "B. Einarsson", 13211 title = "Solution of the transcendental equation we\slash sup w\slash =x", 13212 journal = j-CACM, 13213 volume = "17", 13214 number = "4", 13215 pages = "225--225", 13216 month = apr, 13217 year = "1974", 13218 CODEN = "CACMA2", 13219 ISSN = "0001-0782", 13220 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13221 acknowledgement = ack-nhfb, 13222 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 13223 corpsource = "Res. Inst. Nat. Defense, Tumba, Sweden", 13224 keywords = "function evaluation; subroutines; transcendental equation; violation of the Fortran standard", 13225 treatment = "G General Review; T Theoretical or Mathematical", 13226} 13227 13228@Article{Shaw:1974:RCC, 13229 author = "Mary Shaw", 13230 title = "Reduction of Compilation Costs Through Language Contraction", 13231 journal = j-CACM, 13232 volume = "17", 13233 number = "5", 13234 pages = "245--250", 13235 month = may, 13236 year = "1974", 13237 CODEN = "CACMA2", 13238 ISSN = "0001-0782", 13239 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13240 bibsource = "Compendex database", 13241 abstract = "Programming languages tailored to particular groups of users can often be constructed by removing unwanted features from a general purpose language. This paper describes the use of simulation techniques to predict the savings in compilation cost achievable by such an approach. The results suggest a function which describes the effect of changes in the power of a language on the compilation cost of an algorithm expressed in that language: when features not actually used by the algorithm are removed from the language, the cost of compiling the algorithm decreases moderately, but when features that are needed are removed, the compilation cost increases sharply.", 13242 acknowledgement = ack-nhfb, 13243 classcodes = "C6140 (Programming languages); C6150C (Compilers, interpreters and other processors)", 13244 classification = "723", 13245 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 13246 journalabr = "Commun ACM", 13247 keywords = "compilation costs; compiler design; computational complexity; computer programming languages; design of programming languages; general purpose language; language contraction; languages; programming; programming languages; simulation techniques", 13248 treatment = "A Application; T Theoretical or Mathematical", 13249} 13250 13251@Article{Wegbreit:1974:TDT, 13252 author = "Ben Wegbreit", 13253 title = "The treatment of data types in {EL1}", 13254 journal = j-CACM, 13255 volume = "17", 13256 number = "5", 13257 pages = "251--264", 13258 month = may, 13259 year = "1974", 13260 CODEN = "CACMA2", 13261 ISSN = "0001-0782", 13262 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13263 bibsource = "Compendex database", 13264 abstract = "In constructing a general purpose programming language, a key issue is providing a sufficient set of data types and associated operations in a manner that permits both natural problem-oriented notation and efficient implementation. The EL1 language contains a number of features specifically designed to simultaneously satisfy both requirements. The resulting treatment of data types includes provision for programmer-defined data types and generic routines, programmer control over type conversion, and very flexible data type behavior, in a context that allows efficient compiled code and compact data representation.", 13265 acknowledgement = ack-nhfb, 13266 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", 13267 classification = "723", 13268 corpsource = "Harvard Univ., Cambridge, MA, USA", 13269 journalabr = "Commun ACM", 13270 keywords = "behaviour; coercion; compilation; computer programming languages; data description language; data handling; data type definition; data types; efficient implementation; EL1; extensible; flexible data type; general purpose programming language; generic routines; language; languages; mode unions; modes; problem oriented notation; procedure oriented languages; programmer control; programmer defined data types; type conversion", 13271 treatment = "A Application; T Theoretical or Mathematical", 13272} 13273 13274@Article{Wagner:1974:OCR, 13275 author = "Robert A. Wagner", 13276 title = "Order-$n$ Correction for Regular Languages", 13277 journal = j-CACM, 13278 volume = "17", 13279 number = "5", 13280 pages = "265--268", 13281 month = may, 13282 year = "1974", 13283 CODEN = "CACMA2", 13284 ISSN = "0001-0782", 13285 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13286 bibsource = "Compendex database", 13287 abstract = "A method is presented for calculating a string B, belonging to a given regular language L, which is ``nearest'' (in number of edit operations) to a given input string $a$. $B$ is viewed as a reasonable ``correction'' for the possibly erroneous string $a$, where a was originally intended to be a string of $L$. \par The calculation of $B$ by the method presented requires time proportional to $|a|$, the number of characters in $a$. The method should find applications in information retrieval, artificial intelligence, and spelling correction systems.", 13288 acknowledgement = ack-nhfb, 13289 classcodes = "C4210 (Formal logic); C6130 (Data handling techniques)", 13290 classification = "723", 13291 corpsource = "Vanderbilt Univ., Nashville, TN, USA", 13292 journalabr = "Commun ACM", 13293 keywords = "artificial intelligence; compiler error recovery; computer programming languages; context free languages; context-free languages; correction; corrector; edit operations; error correction; error correction codes; errors; finite state automata; information; nondeterministic finite state automata; nondeterministic finite-state automata; order $n$ correction; regular events; regular languages; retrieval; spelling correction; string best match problem", 13294 treatment = "T Theoretical or Mathematical", 13295} 13296 13297@Article{Tsao:1974:DSD, 13298 author = "Nai Kuan Tsao", 13299 title = "On the Distributions of Significant Digits and Roundoff Errors", 13300 journal = j-CACM, 13301 volume = "17", 13302 number = "5", 13303 pages = "269--271", 13304 month = may, 13305 year = "1974", 13306 CODEN = "CACMA2", 13307 ISSN = "0001-0782", 13308 MRclass = "65G05", 13309 MRnumber = "49 6595", 13310 mrreviewer = "N. N. Abdelmalek", 13311 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13312 bibsource = "Compendex database; garbo.uwasa.fi:/pc/doc-soft/fpbiblio.txt", 13313 abstract = "Generalized logarithmic law is derived for the distribution of the first t significant digits of a random digital integer. This result is then used to determine the distribution of the roundoff errors in floating-point operations, which is a mixture of uniform and reciprocal distributions.", 13314 acknowledgement = ack-nhfb, 13315 classcodes = "C5230 (Digital arithmetic methods)", 13316 classification = "921", 13317 corpsource = "Aerospace Res. Labs., Wright-Patterson AFB, OH, USA", 13318 journalabr = "Commun ACM", 13319 keywords = "digital arithmetic; digital integer; distributions; error analysis; floating point operations; logarithmic law; mathematical techniques; mean value; random; reciprocal; roundoff errors; significant digits; uniform distribution; variance", 13320 treatment = "T Theoretical or Mathematical", 13321} 13322 13323@Article{Wunderlich:1974:DNT, 13324 author = "M. C. Wunderlich and J. L. Selfridge", 13325 title = "Design for a Number Theory Package with an Optimized Trial Division Routine", 13326 journal = j-CACM, 13327 volume = "17", 13328 number = "5", 13329 pages = "272--276", 13330 month = may, 13331 year = "1974", 13332 CODEN = "CACMA2", 13333 ISSN = "0001-0782", 13334 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13335 bibsource = "Compendex database", 13336 abstract = "A number theory package is described which uses doubly linked list structures for storing multiprecise integers. The package has been coded in IBM's Basic Assembly Language and makes heavy use of the macro language and conditional assembly. An optimally coded trial division routine is also described which can be used to determine the unique factorization of large integers.", 13337 acknowledgement = ack-nhfb, 13338 classcodes = "C5230 (Digital arithmetic methods)", 13339 classification = "921", 13340 corpsource = "Northern Illinois Univ., Dekalb, IL, USA", 13341 journalabr = "Commun ACM", 13342 keywords = "arithmetic; Basic; conditional assembly; design; doubly linked list structures; doubly linked lists; factorization; integers; macro language; mathematical techniques; multiprecise; number theory; number theory package; optimally coded; optimized trial division; pseudoprime; routine; trial division; utility programs", 13343 treatment = "T Theoretical or Mathematical", 13344} 13345 13346@Article{Gentleman:1974:MAR, 13347 author = "W. M. Gentleman and S. B. Marovich", 13348 title = "More on Algorithms that Reveal Properties of Floating Point Arithmetic Units", 13349 journal = j-CACM, 13350 volume = "17", 13351 number = "5", 13352 pages = "276--277", 13353 month = may, 13354 year = "1974", 13355 CODEN = "CACMA2", 13356 ISSN = "0001-0782", 13357 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13358 bibsource = "garbo.uwasa.fi:/pc/doc-soft/fpbiblio.txt", 13359 acknowledgement = ack-nhfb, 13360 classcodes = "C5230 (Digital arithmetic methods)", 13361 corpsource = "Univ. Waterloo, Ont., Canada", 13362 keywords = "algorithms; base of the arithmetic; digital arithmetic; floating point arithmetic units; high level; languages; trailing digits", 13363 treatment = "T Theoretical or Mathematical", 13364} 13365 13366@Article{Gold:1974:MMR, 13367 author = "D. E. Gold and D. J. Kuck", 13368 title = "A Model for Masking Rotational Latency by Dynamic Disk Allocation", 13369 journal = j-CACM, 13370 volume = "17", 13371 number = "5", 13372 pages = "278--288", 13373 month = may, 13374 year = "1974", 13375 CODEN = "CACMA2", 13376 ISSN = "0001-0782", 13377 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13378 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 13379 abstract = "This paper presents the background and algorithms for masking the rotational latency of a disk or drum. It discusses the anticipatory input and output of blocks of data to buffer and primary memories for a mono-programmed computer system. A basic permutation algorithm and several variations are given. Because of the anticipatory nature of the I/O scheduling, these algorithms are restricted to classes of programs with predictable behavior. While the methods are not restricted to numerical computations, matrix and partial differential equation methods are typical examples of their use. It is shown tha latency may be masked using a small amount of buffer memory. The methods discussed are independent of the overall size of the data base being considered.", 13380 acknowledgement = ack-nhfb, 13381 annote = "Optimal arrangement of data to minimize buffer needs.", 13382 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 13383 classification = "722; 723", 13384 corpsource = "Univ. Illinois, Urbana-Champaign, IL, USA", 13385 journalabr = "Commun ACM", 13386 keywords = "(computers); algorithm; anticipatory input; anticipatory output; behaviour; buffer; buffer memory; computer operating systems; computer system; data storage, magnetic --- Disk; dynamic disc allocation; magnetic disc and drum storage; masking; memory hierarchy; model; monoprogrammed; operating systems; permutation; permutation algorithm; predictable; primary memories; rotational latency; staging; storage allocation", 13387 treatment = "A Application; T Theoretical or Mathematical", 13388} 13389 13390@Article{Cohen:1974:TLE, 13391 author = "Jacques Cohen and Carl Zuckerman", 13392 title = "Two Languages for Estimating Program Efficiency", 13393 journal = j-CACM, 13394 volume = "17", 13395 number = "6", 13396 pages = "301--308", 13397 month = jun, 13398 year = "1974", 13399 CODEN = "CACMA2", 13400 ISSN = "0001-0782", 13401 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13402 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/monitor.bib and ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib", 13403 abstract = "Two languages enabling their users to estimate the efficiency of computer programs are presented. The program whose efficiency one wishes to estimate is written in the first language, a go-to-less programming language which includes most of the features of Algol 60. The second language consists of interactive commands enabling its users to provide additional information about the program written in the first language and to output results estimating its efficiency. Processors for the two languages are also described. The first processor is a syntax-directed translator which compiles a program into a symbolic formula representing the execution time for that program. The second processor is a set of procedures for algebraic manipulation which can be called by the user to operate on the formula produced by the first processor. Examples of the usage of the two languages are included. The limitations of the present system, its relation to Knuth's work on the analysis of algorithms, and some of the directions for further research are also discussed.", 13404 acknowledgement = ack-nhfb, 13405 classcodes = "C6140D (High level languages); C6150C (Compilers, interpreters and other processors); C6150G (Diagnostic, testing, debugging and evaluating systems)", 13406 classification = "723", 13407 corpsource = "Brandeis Univ., Waltham, MA, USA", 13408 country = "USA", 13409 descriptors = "Programming language; runtime/storage efficiency; analysis; algorithm;", 13410 enum = "614", 13411 journalabr = "Commun ACM", 13412 keywords = "analysis of algorithms; computer programming languages; efficiency; estimating program efficiency; go to less; interactive commands; languages; procedure oriented languages; processors; program; program diagnostics; program efficiency; programming language; programming languages; symbolic manipulation; syntax directed translation; syntax-directed translation", 13413 language = "English", 13414 references = "16", 13415 treatment = "A Application; P Practical", 13416} 13417 13418@Article{Henschen:1974:TPL, 13419 author = "L. Henschen and Ross A. Overbeek and L. Wos", 13420 title = "A Theorem-Proving Language for Experimentation", 13421 journal = j-CACM, 13422 volume = "17", 13423 number = "6", 13424 pages = "308--314", 13425 month = jun, 13426 year = "1974", 13427 CODEN = "CACMA2", 13428 ISSN = "0001-0782", 13429 MRclass = "68A40", 13430 MRnumber = "49 6698", 13431 mrreviewer = "K. H. V. Booth", 13432 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13433 bibsource = "Compendex database", 13434 abstract = "Because of the large number of strategies and inference rules presently under consideration in automated theorem proving, there is a need for developing a language especially oriented toward automated theorem proving. This paper discusses some of the features and instructions of this language. The use of this language permits easy extension of automated theorem-proving programs to include new strategies and/or new inference rules. Such extend ability will permit general experimentation with the various alternative systems.", 13435 acknowledgement = ack-nhfb, 13436 classcodes = "C1230 (Artificial intelligence); C6140D (High level languages)", 13437 classification = "723", 13438 corpsource = "Northwestern Univ., Evanston, IL, USA", 13439 journalabr = "Commun ACM", 13440 keywords = "computer programming languages; factoring; paramodulation; programming languages; resolution; theorem proving", 13441 keywords = "alternative systems; automated theorem proving; experimentation; factoring; paramodulation; problem oriented languages; programming languages; resolution; strategies and inference rules presently; theorem proving", 13442 treatment = "P Practical", 13443} 13444 13445@Article{Gimpel:1974:MSC, 13446 author = "James F. Gimpel", 13447 title = "The minimization of spatially-multiplexed character sets", 13448 journal = j-CACM, 13449 volume = "17", 13450 number = "6", 13451 pages = "315--318", 13452 month = jun, 13453 year = "1974", 13454 CODEN = "CACMA2", 13455 ISSN = "0001-0782", 13456 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13457 bibsource = "Compendex database", 13458 abstract = "The paper describes a technique for compacting character sets in a digital computer while retaining fast access to individual bits. It considers the problem of minimizing the storage needed to contain such tables. Reduction techniques are developed, and the problem is shown to reduce to a covering problem.", 13459 acknowledgement = ack-nhfb, 13460 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 13461 classification = "723", 13462 corpsource = "Bell Telephone Labs., Holmdel, NJ, USA", 13463 journalabr = "Commun ACM", 13464 keywords = "character sets; compacting character sets; computer programming; covering problem; data handling; data structures; fast access to; individual bits; lexical analysis; minimizing the storage; parsing; reduction; scanning; spatial multiplexing; string processing; techniques", 13465 treatment = "P Practical", 13466} 13467 13468@Article{Barrodale:1974:AAS, 13469 author = "I. Barrodale and F. D. K. Roberts", 13470 title = "{ACM} Algorithm 478: Solution of an Overdetermined System of Equations in the ${L_1}$ Norm", 13471 journal = j-CACM, 13472 volume = "17", 13473 number = "6", 13474 pages = "319--320", 13475 month = jun, 13476 year = "1974", 13477 CODEN = "CACMA2", 13478 ISSN = "0001-0782", 13479 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13480 acknowledgement = ack-nhfb, 13481 classcodes = "B0260 (Optimisation techniques); B0290F (Interpolation and function approximation); C1180 (Optimisation techniques); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 13482 corpsource = "Univ. Victoria, BC, Canada", 13483 keywords = "algorithm; function approximation; l/sub 1/ approximation; l1 norm; linear programming; minimizes; overdetermined system of equations; simplex method; subroutines; sum of the absolute values of the residuals", 13484 treatment = "A Application; T Theoretical or Mathematical", 13485} 13486 13487@Article{Page:1974:AAM, 13488 author = "R. L. Page", 13489 title = "{ACM} Algorithm 479: {A} Minimal Spanning Tree Clustering Method", 13490 journal = j-CACM, 13491 volume = "17", 13492 number = "6", 13493 pages = "321--323", 13494 month = jun, 13495 year = "1974", 13496 CODEN = "CACMA2", 13497 ISSN = "0001-0782", 13498 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13499 note = "See also \cite{White:1976:RMS}.", 13500 acknowledgement = ack-nhfb, 13501 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition); C7310 (Mathematics computing)", 13502 corpsource = "Colorado State Univ., Fort Collins, CO, USA", 13503 keywords = "complete graph; feature; FORTRAN; graph theory; human perception; minimal spanning tree; pattern recognition; selection; subroutines", 13504 treatment = "P Practical", 13505} 13506 13507@Article{Gaither:1974:HPP, 13508 author = "B. Gaither", 13509 title = "Hidden-line plotting program", 13510 journal = j-CACM, 13511 volume = "17", 13512 number = "6", 13513 pages = "324--324", 13514 month = jun, 13515 year = "1974", 13516 CODEN = "CACMA2", 13517 ISSN = "0001-0782", 13518 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13519 acknowledgement = ack-nhfb, 13520 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques); C7310 (Mathematics computing)", 13521 corpsource = "New Mexico Inst. Mining and Technol., Socorro, NM, USA", 13522 keywords = "algorithm; computer graphics; division by zero; hidden line; plotting program", 13523 treatment = "G General Review; P Practical", 13524} 13525 13526@Article{Piessens:1974:CFI, 13527 author = "R. Piessens", 13528 title = "Calculation of {Fourier} integrals", 13529 journal = j-CACM, 13530 volume = "17", 13531 number = "6", 13532 pages = "324--324", 13533 month = jun, 13534 year = "1974", 13535 CODEN = "CACMA2", 13536 ISSN = "0001-0782", 13537 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13538 acknowledgement = ack-nhfb, 13539 classcodes = "B0290Z (Other numerical methods); C4190 (Other numerical methods); C7310 (Mathematics computing)", 13540 corpsource = "Univ. Leuven, Heverlee, Belgium", 13541 keywords = "algorithm; Fourier integrals; Fourier transforms; integration", 13542 treatment = "G General Review; P Practical", 13543} 13544 13545@Article{Piessens:1974:MHI, 13546 author = "R. Piessens", 13547 title = "Modified {Havie} integration", 13548 journal = j-CACM, 13549 volume = "17", 13550 number = "6", 13551 pages = "324--324", 13552 month = jun, 13553 year = "1974", 13554 CODEN = "CACMA2", 13555 ISSN = "0001-0782", 13556 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13557 acknowledgement = ack-nhfb, 13558 classcodes = "B0290M (Numerical integration and differentiation); C4160 (Numerical integration and differentiation); C7310 (Mathematics computing)", 13559 corpsource = "Univ. Leuven, Heverlee, Belgium", 13560 keywords = "algorithm; automatic; integration; integrators; modified Havie integration; numerical analysis; overflows; specified tolerances", 13561 treatment = "G General Review; T Theoretical or Mathematical", 13562} 13563 13564@Article{Ellis:1974:HPP, 13565 author = "T. M. R. Ellis", 13566 title = "Hidden-line plotting program", 13567 journal = j-CACM, 13568 volume = "17", 13569 number = "6", 13570 pages = "324--325", 13571 month = jun, 13572 year = "1974", 13573 CODEN = "CACMA2", 13574 ISSN = "0001-0782", 13575 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13576 acknowledgement = ack-nhfb, 13577 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques); C7310 (Mathematics computing)", 13578 corpsource = "Univ. Sheffield, UK", 13579 keywords = "algorithm; computer graphics; error; hidden line plotting program; plotting program", 13580 treatment = "G General Review; P Practical", 13581} 13582 13583@Article{Page:1974:GRC, 13584 author = "R. L. Page", 13585 title = "Generation of random correlated normal variables", 13586 journal = j-CACM, 13587 volume = "17", 13588 number = "6", 13589 pages = "325--325", 13590 month = jun, 13591 year = "1974", 13592 CODEN = "CACMA2", 13593 ISSN = "0001-0782", 13594 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13595 acknowledgement = ack-nhfb, 13596 classcodes = "C7890 (Other special applications of computing)", 13597 corpsource = "Colorado State Univ., Fort Collins, CO, USA", 13598 keywords = "algorithm; array parameters; random correlated normal variables; random number generation; revises; work", 13599 treatment = "G General Review; P Practical", 13600} 13601 13602@Article{Boulton:1974:EPR, 13603 author = "D. M. Boulton", 13604 title = "Exact probabilities for {R}*{C} contingency tables", 13605 journal = j-CACM, 13606 volume = "17", 13607 number = "6", 13608 pages = "326--326", 13609 month = jun, 13610 year = "1974", 13611 CODEN = "CACMA2", 13612 ISSN = "0001-0782", 13613 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13614 acknowledgement = ack-nhfb, 13615 classcodes = "C7310 (Mathematics computing)", 13616 corpsource = "Monash Univ., Melbourne, Vic., Australia", 13617 keywords = "algorithm; cell frequency combinations; contingency tables; dimensional contingency table; exact probabilities; inefficient; marginal sum constraints; probability; two", 13618 treatment = "G General Review; P Practical", 13619} 13620 13621@Article{Slysz:1974:ESS, 13622 author = "W. D. Slysz", 13623 title = "An evaluation of software in the social sciences", 13624 journal = j-CACM, 13625 volume = "17", 13626 number = "6", 13627 pages = "326--332", 13628 month = jun, 13629 year = "1974", 13630 CODEN = "CACMA2", 13631 ISSN = "0001-0782", 13632 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13633 acknowledgement = ack-nhfb, 13634 classcodes = "C7810 (Social and behavioural sciences computing)", 13635 corpsource = "Univ. Connecticut, Storrs, CT, USA", 13636 keywords = "bivariate; BMD; college; cost; DATA TEXT; descriptive statistics; factor analysis; one way analysis of variance; OSIRIS; Pearson correlation; performance; regression; social and behavioural sciences; social sciences; SPSS; statistical analysis; statistical computation; statistical packages; statistical software; tables; TSAR; university", 13637 treatment = "A Application; P Practical", 13638} 13639 13640@Article{Adams:1974:CRC, 13641 author = "John Adams and John Gary", 13642 title = "Compact Representation of Contour Plots for Phone Line Transmission", 13643 journal = j-CACM, 13644 volume = "17", 13645 number = "6", 13646 pages = "333--336", 13647 month = jun, 13648 year = "1974", 13649 CODEN = "CACMA2", 13650 ISSN = "0001-0782", 13651 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13652 bibsource = "Compendex database", 13653 abstract = "Methods for the compact representation of contour plots are described and tested. These are intended to reduce the cost of transmitting contour plots over phone lines. Some of these methods could be used to transmit contour plots over voice grade phone lines.", 13654 acknowledgement = ack-nhfb, 13655 classcodes = "B6210D (Telephony); C5540 (Terminals and graphic displays); C5600 (Data communication equipment and techniques)", 13656 classification = "723", 13657 corpsource = "Nat. Center Atmospheric Res., Boulder, CO, USA", 13658 journalabr = "Commun ACM", 13659 keywords = "compact representation; computer graphics; contour plots; data compaction; data transmission; data transmission systems; phone line; remote terminal; transmission; voice grade phone lines", 13660 treatment = "P Practical", 13661} 13662 13663@Article{Wulf:1974:HKM, 13664 author = "W. Wulf and E. Cohen and W. Corwin and A. Jones and R. Levin and C. Pierson and F. Pollack", 13665 title = "{HYDRA}: The Kernel of a Multiprocessor Operating System", 13666 journal = j-CACM, 13667 volume = "17", 13668 number = "6", 13669 pages = "337--345", 13670 month = jun, 13671 year = "1974", 13672 CODEN = "CACMA2", 13673 ISSN = "0001-0782", 13674 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13675 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 13676 abstract = "This paper describes the design philosophy of HYDRA the kernel of an operating system for C. mmp, the Carnegie-Mellon Multi-Mini-Processor. This philosophy is realized through the introduction of a generalized notion of ``resource,'' both physical and virtual, called an ``object.'' Mechanisms are presented for dealing with objects, including the creation of new types, specification of new operations applicable to a given type, sharing, and protection of any reference to a given object against improper application of any of the operations defined with respect to that type of object. The mechanisms provide a coherent basis for extension of the system in two directions: the introduction of new facilities, and the creation of highly secure systems.", 13677 acknowledgement = ack-nhfb, 13678 annote = "Includes protection mechanism using capabilities attached to references.", 13679 classcodes = "C6150J (Operating systems)", 13680 classification = "722", 13681 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 13682 journalabr = "Commun ACM", 13683 keywords = "computer operating systems; design philosophy; highly secure systems; HYDRA; kernel; multiprocessing programs; multiprocessor operating system; new facilities; nucleus; operating systems (computers); protection; security olit hydra capabilities; sharing", 13684 treatment = "A Application; P Practical", 13685} 13686 13687@Article{Barton:1974:ITA, 13688 author = "Ian J. Barton and Susan E. Creasey and Michael F. Lynch and Michael J. Snell", 13689 title = "An Information-Theoretic Approach to Text Searching in Direct Access Systems", 13690 journal = j-CACM, 13691 volume = "17", 13692 number = "6", 13693 pages = "345--350", 13694 month = jun, 13695 year = "1974", 13696 CODEN = "CACMA2", 13697 ISSN = "0001-0782", 13698 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13699 bibsource = "Compendex database", 13700 abstract = "Using direct access computer files of bibliographic information, an attempt is made to overcome one of the problems often associated with information retrieval, namely, the maintenance and use of large dictionaries, the greater part of which is used only infrequently. A novel method is presented, which maps the hyperbolic frequency distribution. This is more suited to implementation on storage devices. \par This method treats text as a string of characters rather than words bounded by spaces, and chooses subsets of strings such that their frequencies of occurrence are more even than those of word types. The members of this subset are then used as index keys for retrieval. The rectangular distribution of key frequencies results in a much simplified file organization and promises considerable cost advantages.", 13701 acknowledgement = ack-nhfb, 13702 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 13703 classification = "723; 731", 13704 corpsource = "Univ. Sheffield, UK", 13705 journalabr = "Commun ACM", 13706 keywords = "bit vector; character string; data processing --- File Organization; direct access; file organization; information retrieval; information theory; text searching", 13707 keywords = "bibliographic information; bit vector; character string; characteristics; computer files; dictionaries; direct access; direct access systems; file organisation; hyperbolic frequency distribution of text; index keys; information retrieval; information theory; large; rectangular distribution; simplified file organization; text searching", 13708 treatment = "P Practical", 13709} 13710 13711@Article{Minieka:1974:CSS, 13712 author = "Edward Minieka", 13713 title = "On Computing Sets of Shortest Paths in a Graph", 13714 journal = j-CACM, 13715 volume = "17", 13716 number = "6", 13717 pages = "351--353", 13718 month = jun, 13719 year = "1974", 13720 CODEN = "CACMA2", 13721 ISSN = "0001-0782", 13722 MRclass = "05C35", 13723 MRnumber = "49 7178", 13724 mrreviewer = "Torrence D. Parsons", 13725 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13726 bibsource = "Compendex database", 13727 abstract = "Two algorithms are presented that construct the $k$ shortest paths between every pair of vertices in a directed graph. These algorithms generalize the Floyd algorithm and the Dantzig algorithm for finding the shortest path between every pair of vertices in a directed graph.", 13728 acknowledgement = ack-nhfb, 13729 classcodes = "C7190 (Other fields of business and administrative computing)", 13730 classification = "921", 13731 corpsource = "Univ. Illinois, Chicago, IL, USA", 13732 journalabr = "Commun ACM", 13733 keywords = "algorithm; computer aided analysis; critical path analysis; Dantzig algorithm; directed graph; Floyd algorithm; graph; mathematical techniques; network; shortest path; shortest paths", 13734 treatment = "A Application; P Practical", 13735} 13736 13737@Article{Ritchie:1974:UTS, 13738 author = "Dennis M. Ritchie and Ken Thompson", 13739 title = "The {UNIX} Time-Sharing System", 13740 journal = j-CACM, 13741 volume = "17", 13742 number = "7", 13743 pages = "365--375", 13744 month = jul, 13745 year = "1974", 13746 CODEN = "CACMA2", 13747 ISSN = "0001-0782", 13748 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13749 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 13750 abstract = "This paper discusses the nature and implementation of the file system and of the user command interface. UNIX is a general-purpose, multi-user, interactive operating system for the Digital Equipment Corporation PDP-11\slash 40 and 11\slash 45 computers. It offers a number of features seldom found even in larger operating systems, including: (1) a hierarchical file system incorporating demountable volumes; (2) compatible file, device, and inter-process I/O; (3) the ability to initiate asynchronous processes; (4) system command language selectable on a per-user basis; and (5) over 100 subsystems including a dozen languages.", 13751 acknowledgement = ack-nhfb, 13752 annote = "Interactive operating system for PDP-11, VAX with a hierarchical file system incorporating demountable volumes.", 13753 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 13754 classification = "723", 13755 corpsource = "Bell Labs., Murray Hill, NJ, USA", 13756 journalabr = "Commun ACM", 13757 keywords = "asynchronous; command language; compatible file; computer systems programming; demountable volumes; file organisation; file system; hierarchical file system; operating; operating systems (computers); processes; sharing systems; system; system command language; time sharing; time-; UNIX interactive operating system", 13758 treatment = "A Application; P Practical", 13759} 13760 13761@Article{Fuller:1974:MTP, 13762 author = "Samuel H. Fuller", 13763 title = "Minimal-Total-Processing Time Drum and Disk Scheduling Disciplines", 13764 journal = j-CACM, 13765 volume = "17", 13766 number = "7", 13767 pages = "376--381", 13768 month = jul, 13769 year = "1974", 13770 CODEN = "CACMA2", 13771 ISSN = "0001-0782", 13772 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13773 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 13774 abstract = "This article investigates the application of minimal-total-processing-time (MTPT) scheduling disciplines to rotating storage units when random arrival of requests is allowed. Fixed-head drum and moving-head disk storage units are considered, and emphasis is placed on the relative merits of the MTPT scheduling discipline with respect to the shortest-latency-time-first (SLTF) scheduling discipline. The results of the simulation studies presented show that neither scheduling discipline is unconditionally superior to the other.", 13775 acknowledgement = ack-nhfb, 13776 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 13777 classification = "723", 13778 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 13779 journalabr = "Commun ACM", 13780 keywords = "computer programming languages", 13781 keywords = "disc scheduling; drum scheduling; fixed head drum; intra cylinder disc; management; minimal total processing time; moving head disc; operating systems (computers); rotating storage units; scheduling; scheduling disciplines; shortest latency time first; simulation; sorting; storage", 13782 treatment = "A Application; P Practical", 13783} 13784 13785@Article{Bruno:1974:SIT, 13786 author = "J. Bruno and E. G. {Coffman, Jr.} and R. Sethi", 13787 title = "Scheduling Independent Tasks To Reduce Mean Finishing Time", 13788 journal = j-CACM, 13789 volume = "17", 13790 number = "7", 13791 pages = "382--387", 13792 month = jul, 13793 year = "1974", 13794 CODEN = "CACMA2", 13795 ISSN = "0001-0782", 13796 MRclass = "90B35", 13797 MRnumber = "50 9338", 13798 mrreviewer = "John C. Gittins", 13799 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13800 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 13801 abstract = "A deterministic model of independent tasks is introduced and new results are derived which extend and generalize the algorithms known for minimizing mean finishing time. In addition to presenting and analyzing new algorithms it is shown that the most general mean-finishing-time problem for independent tasks is polynomial complete, hence unlikely to admit of a non-enumerative solution.", 13802 acknowledgement = ack-nhfb, 13803 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C6150J (Operating systems)", 13804 classification = "723", 13805 corpsource = "Pennsylvania State Univ., University Park, PA, USA", 13806 descriptors = "Scheduling; Finish Time;", 13807 journalabr = "Commun ACM", 13808 keywords = "CACM; computer programming languages; deterministic model; independent tasks; mean finishing time; minimisation; minimize; minimizing mean finishing time; minimizing mean flow time; operating systems (computers); optimal; polynomial complete; scheduling; scheduling algorithms; scheduling independent tasks; sequencing algorithms; storage required", 13809 treatment = "A Application; T Theoretical or Mathematical", 13810} 13811 13812@Article{Saltzer:1974:PCI, 13813 author = "Jerome H. Saltzer", 13814 title = "Protection and the Control of Information Sharing in {Multics}", 13815 journal = j-CACM, 13816 volume = "17", 13817 number = "7", 13818 pages = "388--402", 13819 month = jul, 13820 year = "1974", 13821 CODEN = "CACMA2", 13822 ISSN = "0001-0782", 13823 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13824 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 13825 abstract = "The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help provide insight into the tradeoffs among different possible designs. The key mechanisms described include access control lists, hierarchical control of access specifications, identification and authentication of users, and primary memory protection. The paper ends with a discussion of several known weaknesses in the current protection mechanism design.", 13826 acknowledgement = ack-nhfb, 13827 classcodes = "C0310 (EDP management); C6130 (Data handling techniques); C6150J (Operating systems)", 13828 classification = "723", 13829 corpsource = "MIT, Cambridge, MA, USA", 13830 journalabr = "Commun ACM", 13831 keywords = "access control lists; authentication; computer systems programming; control; control of access specifications; descriptors; design principles; hierarchical; identification; information sharing; mechanism design; Multics system; operating systems (computers); operating virtual memory CACM; primary memory protection; privacy; protection; security; security of data; storage; time sharing systems; virtual; virtual memory", 13832 treatment = "A Application; P Practical", 13833} 13834 13835@Article{Fabry:1974:CBA, 13836 author = "R. S. Fabry", 13837 title = "Capability-Based Addressing", 13838 journal = j-CACM, 13839 volume = "17", 13840 number = "7", 13841 pages = "403--412", 13842 month = jul, 13843 year = "1974", 13844 CODEN = "CACMA2", 13845 ISSN = "0001-0782", 13846 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13847 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib and ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib and ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 13848 abstract = "Various addressing schemes making use of segment tables are examined. The inadequacies of these schemes when dealing with shared addresses are explained. These inadequacies are traced to the lack of an efficient absolute address for objects in these systems. The direct use of a capability as an address is shown to overcome these difficulties because it provides the needed absolute address. Implementation of capability-based addressing is discussed. It is predicted that the use of tags to identify capabilities will dominate. A hardware address translation scheme which never requires the modification of the representation of capabilities is suggested.", 13849 acknowledgement = ack-nhfb, 13850 annote = "The direct use of a capability as an address is shown to be useful when dealing with shared addresses. Implementation of capability-based addressing is discussed.", 13851 classcodes = "C6120 (File organisation)", 13852 classification = "723; 901", 13853 corpsource = "Univ. California, Berkeley, CA, USA", 13854 journalabr = "Commun ACM", 13855 keywords = "address translation scheme; addresses; addressing; addressing hardware; addressing schemes; associative; capabilities; capability based addressing; code; computer utility; data structures; hardware; hash table; information sharing; operating systems; programming conventions; protection; protection hardware; registers; security of data; segment tables; shared; storage management; tagged architecture; tags", 13856 keywords = "CACM memory management segments pages operating security olit capabilities; information retrieval systems", 13857 treatment = "A Application; P Practical", 13858} 13859 13860@Article{Popek:1974:FRV, 13861 author = "Gerald J. Popek and Robert P. Goldberg", 13862 title = "Formal Requirements for Virtualizable Third Generation Architectures", 13863 journal = j-CACM, 13864 volume = "17", 13865 number = "7", 13866 pages = "412--421", 13867 month = jul, 13868 year = "1974", 13869 CODEN = "CACMA2", 13870 ISSN = "0001-0782", 13871 MRclass = "68A05", 13872 MRnumber = "49 10177", 13873 mrreviewer = "I. Kaufmann", 13874 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13875 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 13876 abstract = "A model of a third-generation-like computer system is developed. Formal techniques are used to derive precise sufficient conditions to test whether such an architecture can support virtual machines.", 13877 acknowledgement = ack-nhfb, 13878 classcodes = "C5220 (Computer architecture); C7430 (Computer engineering)", 13879 classification = "722", 13880 corpsource = "Univ. California, Los Angeles, CA, USA", 13881 journalabr = "Commun ACM", 13882 keywords = "abstract model; architectures; computer architecture; computer operating systems; formal requirements; generation architecture; hypervisor; operating system; sufficient conditions; systems; third; third generation computer; virtual machine; virtual machine monitor; virtual machines; virtual memory; virtualizable third generation", 13883 treatment = "A Application; P Practical", 13884} 13885 13886@Article{Hahn:1974:NTC, 13887 author = "Bruce Hahn", 13888 title = "A New Technique for Compression and Storage of Data", 13889 journal = j-CACM, 13890 volume = "17", 13891 number = "8", 13892 pages = "434--436", 13893 month = aug, 13894 year = "1974", 13895 CODEN = "CACMA2", 13896 ISSN = "0001-0782", 13897 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13898 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 13899 abstract = "This paper describes techniques that can, in most cases, decrease storage size by a factor of from two to four. The techniques involve special handling of leading and trailing blanks, and the encoding of other symbols in groups of fixed size as unique fixed point numbers. The efficiency of the system is considered and pertinent statistics are given and compared with statistics for other information coding techniques.", 13900 acknowledgement = ack-nhfb, 13901 annote = "Generation of a character dictionary and its use to minimize space.", 13902 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 13903 classification = "731", 13904 corpsource = "Univ. Waterloo, Ont., Canada", 13905 journalabr = "Commun ACM", 13906 keywords = "coding techniques; compression; data handling; data management; data storage; efficiency; encoding; file maintenance; file organisation; fixed point numbers; information coding techniques; information theory; programs; text compression; utility", 13907 treatment = "A Application; P Practical", 13908} 13909 13910@Article{Evans:1974:UAS, 13911 author = "Arthur {Evans, Jr.} and William Kantrowitz and Edwin Weiss", 13912 title = "A User Authentication Scheme Not Requiring Secrecy in the Computer", 13913 journal = j-CACM, 13914 volume = "17", 13915 number = "8", 13916 pages = "437--442", 13917 month = aug, 13918 year = "1974", 13919 CODEN = "CACMA2", 13920 ISSN = "0001-0782", 13921 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13922 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 13923 abstract = "In many computer operating systems a user authenticates himself by entering a secret password known solely to himself and the system. The system compares this password with one recorded in a Password Table which is available to only the authentication program. The integrity of the system depends on keeping the table secret. In this paper a password scheme is presented which does not require secrecy in the computer. All aspects of the system, including all relevant code and data bases, may be known by anyone attempting to intrude. The scheme is based on using a function H which the would-be intruder is unable to invert. This function is applied to the user's password and the result compared to a table entry, a match being interpreted as authentication of the user. The intruder may know all about H and have access to the table, but he can penetrate the system only if he can invert H to determine an input that produces a given output. This paper discusses issues surrounding selection of a suitable H.", 13924 acknowledgement = ack-nhfb, 13925 annote = "Password protection by irreversible transformation", 13926 classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", 13927 classification = "722; 723", 13928 corpsource = "MIT, Lexington, MA, USA", 13929 journalabr = "Commun ACM", 13930 keywords = "authentication; computer operating systems; cryptology; engineering problems; human; invert; one way encryption; operating system security; operating systems (computers); password scheme; security; security of data; user authentication scheme", 13931 treatment = "A Application; T Theoretical or Mathematical", 13932} 13933 13934@Article{Purdy:1974:HSL, 13935 author = "George B. Purdy", 13936 title = "A High Security Log-in Procedure", 13937 journal = j-CACM, 13938 volume = "17", 13939 number = "8", 13940 pages = "442--445", 13941 month = aug, 13942 year = "1974", 13943 CODEN = "CACMA2", 13944 ISSN = "0001-0782", 13945 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13946 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 13947 abstract = "The protection of time sharing systems from unauthorized users is often achieved by the use of passwords. By using one-way ciphers to code the passwords, the risks involved with storing the passwords in the computer can be avoided. The selection of a suitable one-way cipher is discussed. It is suggested that for this purpose polynomials over a prime modulus are superior to one-way ciphers derived from Shannon codes.", 13948 acknowledgement = ack-nhfb, 13949 annote = "Password protection by irreversible cryptographic transformation", 13950 classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", 13951 classification = "722; 723", 13952 corpsource = "Univ. Illinois, Urbana-Champaign, IL, USA", 13953 journalabr = "Commun ACM", 13954 keywords = "code; computer operating systems; cryptography; data processing --- Security of Data; one way ciphers; operating systems; operating systems (computers); passwords; security; security of data; time sharing systems", 13955 treatment = "A Application; T Theoretical or Mathematical", 13956} 13957 13958@Article{Friedman:1974:ETR, 13959 author = "Theodore D. Friedman and Lance J. Hoffman", 13960 title = "Execution Time Requirements for Encipherment Programs", 13961 journal = j-CACM, 13962 volume = "17", 13963 number = "8", 13964 pages = "445--449", 13965 month = aug, 13966 year = "1974", 13967 CODEN = "CACMA2", 13968 ISSN = "0001-0782", 13969 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13970 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 13971 abstract = "The time taken to decipher 20,000 words of data by four additive methods on a Control Data 6400 computer was measured using assembly language and Fortran routines. Standard deviations were computed for 100 runs by each method, and from this the range of error at the 95 percent confidence level was calculated. The time required for selecting and fetching the plaintext data and for storing the ciphertext was separately measured (the ``null transformation'' ), and was then compared with the times required by each enciphering method. The enciphering processes required at least four times as much cpu time when programmed in Fortran.", 13972 acknowledgement = ack-nhfb, 13973 classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", 13974 classification = "723", 13975 corpsource = "Univ. California, Berkeley, CA, USA", 13976 journalabr = "Commun ACM", 13977 keywords = "additive ciphers; assembly language; cpu; cryptography; cryptology; data processing; double key encipherment; enciphering time coefficient; encipherment programs; errors; execution time; experiments; Fortran; null; one word key; operating systems (computers); privacy transformations; protection; pseudo random key; security; security of data; time; transformation", 13978 treatment = "A Application; T Theoretical or Mathematical; X Experimental", 13979} 13980 13981@Article{Neufeld:1974:GCC, 13982 author = "G. A. Neufeld and J. Tartar", 13983 title = "Graph Coloring Conditions for the Existence of Solutions to the Timetable Problem", 13984 journal = j-CACM, 13985 volume = "17", 13986 number = "8", 13987 pages = "450--453", 13988 month = aug, 13989 year = "1974", 13990 CODEN = "CACMA2", 13991 ISSN = "0001-0782", 13992 MRclass = "90B35", 13993 MRnumber = "52 16594", 13994 mrreviewer = "Ethan D. Bolker", 13995 bibdate = "Tue Mar 25 13:26:09 MST 1997", 13996 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib", 13997 abstract = "A necessary and sufficient condition is presented for the existence of a solution to the Gotlieb class-teacher timetable problem. Several relationships are established between the class-teacher timetable problem and graphs with preconditions. These preconditions place additional restrictions on the coloration of a graph. The preconditions correspond to the unavailability constraints and preassigned meetings in the class-teacher timetable problem. Using some recent results that convert graphs with preconditions to graphs without them, it is shown that the existence of a coloration of a graph is the required necessary and sufficient condition.", 13998 acknowledgement = ack-nhfb, 13999 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics); C7110 (Educational administration)", 14000 classification = "912; 921", 14001 corpsource = "Univ. Alberta, Edmonton, Alta., Canada", 14002 journalabr = "Commun ACM", 14003 keywords = "class-teacher timetable problem; class-teacher timetables; coloration; educational administrative data processing; graph colouring conditions; graph theory; graphs; graphs with preconditions; mathematical techniques; necessary and; operations research; preassignment; prevention of assignment; scheduling; sufficient condition; timetable problem", 14004 treatment = "A Application; T Theoretical or Mathematical", 14005} 14006 14007@Article{Lamport:1974:NSD, 14008 author = "Leslie Lamport", 14009 title = "A New Solution of {Dijkstra}'s Concurrent Programming Problem", 14010 journal = j-CACM, 14011 volume = "17", 14012 number = "8", 14013 pages = "453--455", 14014 month = aug, 14015 year = "1974", 14016 CODEN = "CACMA2", 14017 ISSN = "0001-0782", 14018 MRclass = "68A05", 14019 MRnumber = "49 8418", 14020 mrreviewer = "James Howland", 14021 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14022 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 14023 abstract = "A simple solution to the mutual exclusion problem is presented which allows the system to continue to operate despite the failure of any individual component.", 14024 acknowledgement = ack-nhfb, 14025 annote = "A solution which is more failure proof.", 14026 classcodes = "C6150J (Operating systems)", 14027 classification = "723", 14028 journalabr = "Commun ACM", 14029 keywords = "computer systems programming; concurrent programming; critical section; Dijkstra's concurrent programming problem; failure; fault tolerant computing; multiprocessing; multiprocessing programs; mutual exclusion; semaphores", 14030 treatment = "A Application; T Theoretical or Mathematical", 14031} 14032 14033@Article{Cavouras:1974:CPD, 14034 author = "John C. Cavouras", 14035 title = "On the Conversion of Programs to Decision Tables: Method and Objectives", 14036 journal = j-CACM, 14037 volume = "17", 14038 number = "8", 14039 pages = "456--462", 14040 month = aug, 14041 year = "1974", 14042 CODEN = "CACMA2", 14043 ISSN = "0001-0782", 14044 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14045 bibsource = "Compendex database", 14046 abstract = "The problems of converting programs to decision tables are investigated. Objectives of these conversions are mainly program debugging and optimization in practice. Extensions to the theory of computation and computability are suggested.", 14047 acknowledgement = ack-nhfb, 14048 classcodes = "C4290 (Other computer theory); C6110 (Systems analysis and programming); C6150G (Diagnostic, testing, debugging and evaluating systems)", 14049 classification = "723", 14050 corpsource = "Univ. Glasgow, UK", 14051 journalabr = "Commun ACM", 14052 keywords = "analysis; computability; computability and decidability; computer systems programming; conversion of programs; debugging; decision tables; objectives; optimization; program; semantics; systems; theory of programming", 14053 treatment = "T Theoretical or Mathematical", 14054} 14055 14056@Article{Lyche:1974:AAP, 14057 author = "T. Lyche and L. L. Schumaker", 14058 title = "{ACM} Algorithm 480: Procedures for Computing Smoothing and Interpolating Natural Splines", 14059 journal = j-CACM, 14060 volume = "17", 14061 number = "8", 14062 pages = "463--467", 14063 month = aug, 14064 year = "1974", 14065 CODEN = "CACMA2", 14066 ISSN = "0001-0782", 14067 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14068 acknowledgement = ack-nhfb, 14069 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 14070 corpsource = "Univ. Texas, Austin, TX, USA", 14071 keywords = "Algol; approximation; coefficients; interpolating; interpolation; natural sciences applications of computers; natural splines; smoothing; spline smoothing; splines (mathematics); subroutines", 14072 treatment = "A Application; T Theoretical or Mathematical", 14073} 14074 14075@Article{Crandall:1974:AAA, 14076 author = "K. C. Crandall", 14077 title = "{ACM} Algorithm 481: Arrow to Precedence Network Transformation", 14078 journal = j-CACM, 14079 volume = "17", 14080 number = "8", 14081 pages = "467--469", 14082 month = aug, 14083 year = "1974", 14084 CODEN = "CACMA2", 14085 ISSN = "0001-0782", 14086 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14087 acknowledgement = ack-nhfb, 14088 classcodes = "C7100 (Business and administration)", 14089 corpsource = "Univ. California, Berkeley, CA, USA", 14090 keywords = "arrow convention; arrow convention networks; computer aided analysis; convention; critical path; critical path analysis; network transformation; precedence; precedence networks; resource allocation; scheduling; subroutines", 14091 treatment = "A Application; T Theoretical or Mathematical", 14092} 14093 14094@Article{McKay:1974:AAT, 14095 author = "John McKay and E. Regener", 14096 title = "{ACM} Algorithm 482: Transitivity Sets [{G7}]", 14097 journal = j-CACM, 14098 volume = "17", 14099 number = "8", 14100 pages = "470--470", 14101 month = aug, 14102 year = "1974", 14103 CODEN = "CACMA2", 14104 ISSN = "0001-0782", 14105 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14106 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 14107 acknowledgement = ack-nhfb, 14108 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics); C7310 (Mathematics computing)", 14109 corpsource = "McGill Univ., Montreal, Que., Canada", 14110 keywords = "sets; transitivity", 14111 keywords = "Algol; algorithm; graph; natural sciences applications of computers; orbits; semigroup; set theory; sets; spanning tree; subroutines; transitivity; transitivity sets", 14112 page = "470", 14113 treatment = "T Theoretical or Mathematical", 14114} 14115 14116@Article{Stroud:1974:GHI, 14117 author = "A. H. Stroud", 14118 title = "{Gauss} Harmonic Interpolation Formulas", 14119 journal = j-CACM, 14120 volume = "17", 14121 number = "8", 14122 pages = "471--475", 14123 month = aug, 14124 year = "1974", 14125 CODEN = "CACMA2", 14126 ISSN = "0001-0782", 14127 MRclass = "65D05", 14128 MRnumber = "50 15265", 14129 mrreviewer = "Stephen Hilbert", 14130 bibdate = "Thu Jan 16 19:52:47 MST 1997", 14131 bibsource = "Compendex database", 14132 abstract = "Let $R$ be an open, bounded, simply connected region in the $(x,y)$-plane and let $(x*,y*)$ be a point in $R$. Assuming R is starlike with respect to $(x*,y*)$, we discuss a method for computing Gauss harmonic interpolation formulas for $R$ and the point $(x*,y*)$. \par Such formulas approximate a harmonic function at $(x*,y*)$ in terms of a linear combination of its values at certain selected points on the boundary of $R$. Such formulas are useful for approximating the solution of the Dirichlet problem for $R$.", 14133 acknowledgement = ack-nhfb, 14134 classification = "921", 14135 journalabr = "Commun ACM", 14136 keywords = "Dirichlet problem; harmonic interpolation; harmonic quadrature; interpolation; mathematical techniques; quadrature", 14137} 14138 14139@Article{Lagerloef:1974:IRR, 14140 author = "Rolf O. E. Lagerloef", 14141 title = "Interpolation with Rounded Ramp Functions", 14142 journal = j-CACM, 14143 volume = "17", 14144 number = "8", 14145 pages = "476--479", 14146 month = aug, 14147 year = "1974", 14148 CODEN = "CACMA2", 14149 ISSN = "0001-0782", 14150 bibdate = "Thu Jan 16 19:52:47 MST 1997", 14151 bibsource = "Compendex database", 14152 abstract = "A new interpolation function is introduced. It has infinitely many continuous derivatives and is a composition of ramp functions with smoothed bends called Rounded Ramp Functions. How the interpolation function can be extended to more than one variable is shown. An efficient Fortran program is given by which the interpolation function can be obtained for a given point set.", 14153 acknowledgement = ack-nhfb, 14154 classification = "921", 14155 journalabr = "Commun ACM", 14156 keywords = "mathematical techniques", 14157} 14158 14159@Article{Acton:1974:RRF, 14160 author = "Forman S. Acton", 14161 title = "Recurrence Relations for the {Fresnel} Integral $\int_0^\infty[\exp(-ct)dt/(t)^{1/2}(1+t^2)]$ and Similar Integrals", 14162 journal = j-CACM, 14163 volume = "17", 14164 number = "8", 14165 pages = "480--481", 14166 month = aug, 14167 year = "1974", 14168 CODEN = "CACMA2", 14169 ISSN = "0001-0782", 14170 MRclass = "65D20 (33A70)", 14171 MRnumber = "49 6554", 14172 bibdate = "Mon Jan 27 12:23:52 1997", 14173 bibsource = "Compendex database", 14174 abstract = "The class of functions defined by $\int_0^\infty[\exp(- cX)dt/(1+Y)(t^{1/2})^k]$ where $X$ and $Y$ are either $t$ or $t^2$ and $k$ is $-1$, $0$, or $1$ can be evaluated by recurrences for all but small values of the parameter $c$. These recurrences, given here, are more efficient than the usual asymptotic series.", 14175 acknowledgement = ack-nhfb, 14176 classification = "921", 14177 journalabr = "Commun ACM", 14178 keywords = "exponential integral; Fresnel integral; mathematical techniques; recurrence relations", 14179} 14180 14181@Article{Willers:1974:NIA, 14182 author = "I. M. Willers", 14183 title = "A New Integration Algorithm for Ordinary Differential Equations Based on Continued Fraction Approximations", 14184 journal = j-CACM, 14185 volume = "17", 14186 number = "9", 14187 pages = "504--508", 14188 month = sep, 14189 year = "1974", 14190 CODEN = "CACMA2", 14191 ISSN = "0001-0782", 14192 MRclass = "65L05", 14193 MRnumber = "49 8367", 14194 mrreviewer = "G. D. Byrne", 14195 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14196 bibsource = "Compendex database", 14197 abstract = "A new integration algorithm is found, and an implementation is compared with other programmed algorithms. The new algorithm is a step-by-step procedure for solving the initial value problem in ordinary differential equations. It is designed to approximate poles of small integer order in the solutions of the differential equations by continued fractions obtained by manipulating the sums of truncated Taylor series expansions. The new method is compared with Gragg-Bulirsh-Stoer, and the Taylor series method. \par The Taylor series method and the new method are shown to be superior in speed and accuracy, while the new method is shown to be most superior when the solution is required near a singularity. The new method can finally be seen to pass automatically through singularities where all the other methods which are discussed will have failed.", 14198 acknowledgement = ack-nhfb, 14199 classcodes = "B0290M (Numerical integration and differentiation); B0290P (Differential equations); C4160 (Numerical integration and differentiation); C4170 (Differential equations)", 14200 classification = "921", 14201 corpsource = "CERN, Geneve, Switzerland", 14202 journalabr = "Commun ACM", 14203 keywords = "boundary-value problems; continued fraction approximations; continued fractions; differential equations; initial value problem; integration; integration algorithm; mathematical techniques; ordinary differential equations; program comparison; singularities; singularity; step by step procedure; Taylor series; Taylor series expansions", 14204 treatment = "T Theoretical or Mathematical", 14205} 14206 14207@Article{Aberth:1974:PNA, 14208 author = "Oliver Aberth", 14209 title = "A Precise Numerical Analysis Program", 14210 journal = j-CACM, 14211 volume = "17", 14212 number = "9", 14213 pages = "509--513", 14214 month = sep, 14215 year = "1974", 14216 CODEN = "CACMA2", 14217 ISSN = "0001-0782", 14218 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14219 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1974.bib", 14220 abstract = "A description is given of a program for computing the solution to a small number of standard numerical analysis problems to any specified accuracy, up to a limit of 2000 correct decimal places. \par Each computed number is bounded in an interval with a multiple precision midpoint. Arithmetic operations involving these numbers are executed according to interval arithmetic concepts, with non-significant digits automatically discarded. Details are supplied of problem specification and problem computation.", 14221 acknowledgement = ack-nhfb, 14222 classcodes = "B0290 (Numerical analysis); C4100 (Numerical analysis); C7310 (Mathematics computing)", 14223 classification = "921", 14224 corpsource = "Texas A and M Univ., College Station, TX, USA", 14225 country = "USA", 14226 descriptors = "Method; realization; numerical method; optimization; information system; program construction; error control; interval arithmetic;", 14227 enum = "3", 14228 journalabr = "Commun ACM", 14229 keywords = "arithmetic; arithmetic operations; error control; interval; interval arithmetic; list structure; mathematical techniques; methods; multiple; multiple precision; natural sciences applications of computers; numerical; numerical analysis; precision midpoint; program; specified accuracy", 14230 language = "English", 14231 references = "11", 14232} 14233 14234@Article{Cheung:1974:IGD, 14235 author = "To-yat. Cheung", 14236 title = "Interactive Graphic Display for Region Partitioning by Linear Programming", 14237 journal = j-CACM, 14238 volume = "17", 14239 number = "9", 14240 pages = "513--516", 14241 month = sep, 14242 year = "1974", 14243 CODEN = "CACMA2", 14244 ISSN = "0001-0782", 14245 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14246 bibsource = "Compendex database", 14247 abstract = "Using linear programming, an interactive graphic display system has been implemented to solve the region design problem of partitioning a region into N nonoverlapping subregions in such a way that their areas are in specified proportions and that the total cost of servicing them is a minimum. In a conversational manner, a user can easily obtain different partitionings by specifying and modifying the boundary, the service centers' locations, the area proportions, and the cost functions. Examples are included.", 14248 acknowledgement = ack-nhfb, 14249 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C5540 (Terminals and graphic displays)", 14250 classification = "723; 921", 14251 corpsource = "Univ. Alberta, Edmonton, Alta., Canada", 14252 journalabr = "Commun ACM", 14253 keywords = "area proportions; area specification; boundary; computer graphics; cost; cost functions; interactive graphic display; interactive terminals; linear; linear programming; mathematical programming, linear; minimum; nonoverlapping subregions; of servicing; programming; region design; region partitioning; service centers' locations", 14254 treatment = "A Application; T Theoretical or Mathematical", 14255} 14256 14257@Article{Schkolnick:1974:ERT, 14258 author = "Mario Schkolnick", 14259 title = "The Equivalence of Reducing Transition Languages and Deterministic Languages", 14260 journal = j-CACM, 14261 volume = "17", 14262 number = "9", 14263 pages = "517--519", 14264 month = sep, 14265 year = "1974", 14266 CODEN = "CACMA2", 14267 ISSN = "0001-0782", 14268 MRclass = "68A30", 14269 MRnumber = "49 8436", 14270 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14271 bibsource = "Compendex database", 14272 abstract = "The class of reducing transition languages introduced by Eickel, Paul, Bauer, and Samelson was shown by Morris to be a proper superclass of the simple precedence languages. In this paper this result is extended, showing that, in fact, the first class is equivalent to the class of deterministic context free languages.", 14273 acknowledgement = ack-nhfb, 14274 classcodes = "C4210 (Formal logic)", 14275 classification = "723", 14276 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 14277 journalabr = "Commun ACM", 14278 keywords = "computer programming languages; context free languages; context-free languages; deterministic; deterministic context free grammars; deterministic context-free grammars; equivalence; languages; precedence languages; reducing transition languages; superclass; syntax controlled generators", 14279 treatment = "T Theoretical or Mathematical", 14280} 14281 14282@Article{Watkins:1974:AAM, 14283 author = "S. L. Watkins", 14284 title = "{ACM} Algorithm 483: Masked Three-Dimensional Plot Program with Rotations", 14285 journal = j-CACM, 14286 volume = "17", 14287 number = "9", 14288 pages = "520--523", 14289 month = sep, 14290 year = "1974", 14291 CODEN = "CACMA2", 14292 ISSN = "0001-0782", 14293 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14294 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1973.bib", 14295 note = "See also \cite{Feinstein:1975:RMT}.", 14296 acknowledgement = ack-nhfb, 14297 classcodes = "C5540 (Terminals and graphic displays); C6150E (General utility programs)", 14298 corpsource = "Univ. Texas, Austin, TX, USA", 14299 country = "USA", 14300 descriptors = "FORTRAN; graphics; application; method; human factors; diagram manipulation; three-dimensional plot;", 14301 enum = "3241", 14302 keywords = "complete computer programs; computer graphics; masked; plot program; programs; rotations; three dimensional plotting; utility", 14303 keywords = "plotting; three-dimensional plotting", 14304 language = "English", 14305 references = "0", 14306 treatment = "A Application", 14307} 14308 14309@Article{Burrell:1974:AAE, 14310 author = "K. H. Burrell", 14311 title = "{ACM} Algorithm 484: Evaluation of the Modified {Bessel} Functions ${K}_0(z)$ and ${K}_1(z)$ for Complex Arguments", 14312 journal = j-CACM, 14313 volume = "17", 14314 number = "9", 14315 pages = "524--526", 14316 month = sep, 14317 year = "1974", 14318 CODEN = "CACMA2", 14319 ISSN = "0001-0782", 14320 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14321 acknowledgement = ack-nhfb, 14322 classcodes = "B0290D (Functional analysis); C4120 (Functional analysis); C7310 (Mathematics computing)", 14323 corpsource = "California Inst. Technol., Pasadena, CA, USA", 14324 keywords = "algorithm; applications of computers; Bessel functions; complex arguments; function evaluation; Gauss-Hermite quadrature; Hankel functions; modified Bessel functions; natural sciences; subroutines", 14325 treatment = "A Application; T Theoretical or Mathematical", 14326} 14327 14328@Article{Eidson:1974:AAC, 14329 author = "H. D. Eidson and L. L. Schumaker", 14330 title = "{ACM} Algorithm 485: Computation of $g$-Splines via a Factorization Method", 14331 journal = j-CACM, 14332 volume = "17", 14333 number = "9", 14334 pages = "526--530", 14335 month = sep, 14336 year = "1974", 14337 CODEN = "CACMA2", 14338 ISSN = "0001-0782", 14339 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14340 acknowledgement = ack-nhfb, 14341 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 14342 corpsource = "Univ. Texas, Austin, TX, USA", 14343 keywords = "approximation; computation; computers; factorization method; FORTRAN subroutines; function approximation; g-splines; Hermite/Birkoff data; interpolating; natural sciences applications of; spline approximation; splines; splines (mathematics); subroutines", 14344 treatment = "A Application; T Theoretical or Mathematical", 14345} 14346 14347@Article{Young:1974:FOA, 14348 author = "John W. Young", 14349 title = "A First Order Approximation to the Optimum Checkpoint Interval", 14350 journal = j-CACM, 14351 volume = "17", 14352 number = "9", 14353 pages = "530--531", 14354 month = sep, 14355 year = "1974", 14356 CODEN = "CACMA2", 14357 ISSN = "0001-0782", 14358 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14359 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 14360 acknowledgement = ack-nhfb, 14361 classcodes = "C6150J (Operating systems)", 14362 corpsource = "Martin Marietta Corp., Orlando, FL, USA", 14363 keywords = "checkpoint; diagnostics; errors; first order approximation; job failures; minimisation; minimize the cost; operating systems (computers); optimum checkpoint interval; program; programming checkpoint; random", 14364 treatment = "A Application; T Theoretical or Mathematical", 14365} 14366 14367@Article{Shwayder:1974:EIT, 14368 author = "Keith Shwayder", 14369 title = "Extending the Information Theory Approach to Converting Limited-Entry Decision Tables to Computer Programs", 14370 journal = j-CACM, 14371 volume = "17", 14372 number = "9", 14373 pages = "532--537", 14374 month = sep, 14375 year = "1974", 14376 CODEN = "CACMA2", 14377 ISSN = "0001-0782", 14378 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14379 bibsource = "Compendex database", 14380 abstract = "This paper modifies an earlier algorithm for converting decision tables into flowcharts which minimize subsequent execution time when compiled into a computer program. The algorithms considered in this paper perform limited search and, accordingly, do not necessarily result in globally optimal solutions. There is an analogy between the problem of converting decision tables into efficient flowcharts and the well-understood problem in information theory of noiseless coding. The results of the noiseless coding literature are used to explore the limitations of algorithms used to solve the decision table problem.", 14381 acknowledgement = ack-nhfb, 14382 classcodes = "C6110 (Systems analysis and programming); C6130 (Data handling techniques)", 14383 classification = "723", 14384 corpsource = "Univ. Chicago, IL, USA", 14385 journalabr = "Commun ACM", 14386 keywords = "coding; computer programs; computer systems programming; converting; converting decision tables; decision tables; depth of search; flowcharting; flowcharts; information theory approach; limited search; list processing; noiseless channel; noiseless coding; sorting", 14387 treatment = "A Application; T Theoretical or Mathematical", 14388} 14389 14390@Article{Hoare:1974:MOS, 14391 author = "C. A. R. Hoare", 14392 title = "Monitors: An Operating System Structuring Concept", 14393 journal = j-CACM, 14394 volume = "17", 14395 number = "10", 14396 pages = "549--557", 14397 month = oct, 14398 year = "1974", 14399 CODEN = "CACMA2", 14400 ISSN = "0001-0782", 14401 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14402 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib and ftp://ftp.ira.uka.de/pub/bibliography/Compiler/reynolds.bib", 14403 note = "Erratum in {\em Communications of the ACM}, Vol. 18, No. 2 (February), p. 95, 1975. This paper contains one of the first solutions to the Dining Philosophers problem.", 14404 abstract = "This paper develops Brinch-Hansen's concept of a monitor as a method of structuring an operating system. It introduces a form of synchronization, describes a possible method of implementation in terms of semaphores and gives a suitable proof rule. Illustrative examples include a single resource scheduler, a bounded buffer, an alarm clock, a buffer pool, a disk head optimizer, and a version of the problem of readers and writers.", 14405 acknowledgement = ack-nhfb, 14406 annote = "Monitors", 14407 checked = "7 April 1989", 14408 classcodes = "C6150J (Operating systems)", 14409 classification = "722; 723", 14410 corpsource = "Queen's Univ. Belfast, UK", 14411 journalabr = "Commun ACM", 14412 keywords = "alarm clock; bounded buffer; buffer pool; CACM synchronization communication semaphores; computer operating systems; disc; exclusion; head optimizer; monitors; multiprogramming; mutual; operating system structuring concept; operating systems (computers); proof rule; readers; scheduler; scheduling; semaphores; single resource; structured multiprogramming; structuring; synchronization; writers", 14413 treatment = "A Application; P Practical", 14414} 14415 14416@Article{Shen:1974:WBM, 14417 author = "Kenneth K. Shen and James L. Peterson", 14418 title = "A Weighted Buddy Method for Dynamic Storage Allocation", 14419 journal = j-CACM, 14420 volume = "17", 14421 number = "10", 14422 pages = "558--568 (or 558--562??)", 14423 month = oct, 14424 year = "1974", 14425 CODEN = "CACMA2", 14426 ISSN = "0001-0782", 14427 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14428 bibsource = "Compendex database", 14429 note = "See corrigendum \cite{Shen:1975:CWB}.", 14430 abstract = "An extension of the buddy method, called the weighted buddy method, for dynamic storage allocation is presented. The weighted buddy method allows block sizes of $2^k$ and $3(2^k)$, whereas the original buddy method allowed only block sizes of $2^k$. This extension is achieved at an additional cost of only two bits per block. Simulation results are presented which compare this method with the buddy method. These results indicate that for a uniform request distribution, the buddy system has less total memory fragmentation than the weighted buddy algorithm. However, the total fragmentation is smaller for the weighted buddy method when the requests are for exponentially distributed block sizes.", 14431 acknowledgement = ack-nhfb, 14432 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 14433 classification = "722; 723", 14434 corpsource = "Stanford Univ., CA, USA", 14435 journalabr = "Commun ACM", 14436 keywords = "allocation; buddy; buddy systems; computer operating systems; dynamic storage allocation; exponentially distributed block sizes; file organisation; fragmentation; memory allocation; operating systems (computers); simulation; storage; system; total memory; uniform request distribution; weighted buddy algorithm; weighted buddy method", 14437 treatment = "A Application; T Theoretical or Mathematical", 14438} 14439 14440@Article{Slutz:1974:NCA, 14441 author = "D. R. Slutz and I. L. Traiger", 14442 title = "A note on the calculation of average working set size", 14443 journal = j-CACM, 14444 volume = "17", 14445 number = "10", 14446 pages = "563--565", 14447 month = oct, 14448 year = "1974", 14449 CODEN = "CACMA2", 14450 ISSN = "0001-0782", 14451 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14452 bibsource = "Compendex database", 14453 abstract = "Finite-length reference string of arbitrary structure are considered, and an exact expression for average working set size in terms of ``corrected'' interference interval statistics is derived. An example is discussed; upper and lower bounds are obtained; and the average working set size function is shown to be efficiently obtained for a set of page sizes, in a single pass of the reference string. This work follows the developments of a paper by Denning and Schwartz, who consider infinite-length reference strings which satisfy certain statistical properties and who derive an expression relating the asymptotic average working set size to the asymptotic missing page rate function under working set replacement.", 14454 acknowledgement = ack-nhfb, 14455 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 14456 classification = "723", 14457 corpsource = "IBM, San Jose, CA, USA", 14458 journalabr = "Commun ACM", 14459 keywords = "arbitrary structure; average working set size; computer operating systems; data structures; finite length reference string; interference interval statistics; operating systems (computers); page; paging; program behaviour; sizes; storage; virtual; working set model", 14460 treatment = "A Application; T Theoretical or Mathematical", 14461} 14462 14463@Article{Shneiderman:1974:SDS, 14464 author = "Ben Shneiderman and Peter Scheuermann", 14465 title = "Structured Data Structures", 14466 journal = j-CACM, 14467 volume = "17", 14468 number = "10", 14469 pages = "566--574", 14470 month = oct, 14471 year = "1974", 14472 CODEN = "CACMA2", 14473 ISSN = "0001-0782", 14474 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14475 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 14476 abstract = "Programming systems which permit arbitrary linked list structures enable the user to create complicated structures without sufficient protection. Deletions can result in unreachable data elements, and there is no guarantee that additions will be performed properly. To remedy this situation, this paper proposes a data structure description and manipulation language which provides for the creation of a restricted class of data structures but ensures the correctness of the program. This is accomplished by an explicit structure declaration facility, a restriction on the permissible operations, and execution-time checks.", 14477 acknowledgement = ack-nhfb, 14478 annote = "Operations on linked structures.", 14479 classcodes = "C6120 (File organisation)", 14480 classification = "723", 14481 corpsource = "Indiana Univ., Bloomington, IN, USA", 14482 journalabr = "Commun ACM", 14483 keywords = "arbitrary linked list; base management system; data; data processing; Data Structure Description and Manipulation; data structures; execution; explicit structure declaration facility; Language; storage management; structured data structures; structured programming; structures; time checks", 14484 treatment = "A Application; P Practical", 14485} 14486 14487@Article{Canaday:1974:BEC, 14488 author = "R. H. Canaday and R. D. Harrison and E. L. Ivie and J. L. Ryder and L. A. Wehr", 14489 title = "A Back-end Computer for Data Base Management", 14490 journal = j-CACM, 14491 volume = "17", 14492 number = "10", 14493 pages = "575--583 (or 575--582??)", 14494 month = oct, 14495 year = "1974", 14496 CODEN = "CACMA2", 14497 ISSN = "0001-0782", 14498 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14499 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 14500 abstract = "It is proposed that the data base management function be placed on a dedicated back-end computer which accepts commands (in a relatively high level language such as the CODASYL Data Base Task Group, April 1971 Report) from a host computer, accesses the data base on secondary storage, and returns results. The advantages of such a configuration are discussed. An experimental implementation, called the Experimental Data Management System, XDAMS, is described and certain conclusions about the back-end approach are drawn from this implementation.", 14501 acknowledgement = ack-nhfb, 14502 annote = "Physical separation of data base management from data processing to gain flexibility, etc. in the XDMS system.", 14503 classcodes = "C6120 (File organisation)", 14504 classification = "723", 14505 corpsource = "Bell Telephone Labs. Inc., Piscataway, NJ, USA", 14506 journalabr = "Commun ACM", 14507 keywords = "data processing", 14508 keywords = "back end computer; computer configurations; computer networks; data base management; Data base Task; digital communication systems; eXperimental Data Management System; Group Language; host computer; secondary storage; storage management", 14509 treatment = "A Application; P Practical", 14510} 14511 14512@Article{Charnes:1974:GTP, 14513 author = "A. Charnes and W. M. Raike and J. D. Stutz and A. S. Walters", 14514 title = "On Generation of Test Problems for Linear Programming Codes", 14515 journal = j-CACM, 14516 volume = "17", 14517 number = "10", 14518 pages = "583--587 (or 583--586??)", 14519 month = oct, 14520 year = "1974", 14521 CODEN = "CACMA2", 14522 ISSN = "0001-0782", 14523 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14524 bibsource = "Compendex database", 14525 abstract = "This paper presents a theoretical justification and an illustrative implementation of a method for generating linear programming test problems with known solutions. The method permits the generation of test problems that are of arbitrary size and have a wide range of numerical characteristics.", 14526 acknowledgement = ack-nhfb, 14527 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C6130 (Data handling techniques)", 14528 classification = "723; 921", 14529 corpsource = "Univ. Texas, Austin, TX, USA", 14530 journalabr = "Commun ACM", 14531 keywords = "accuracy; codes; computer programming; data handling; large; linear programming; linear programming codes; LP; LP program validation; mathematical programming, linear; program evaluation; scale linear programming codes; test problem generation; test problems", 14532 treatment = "A Application; T Theoretical or Mathematical", 14533} 14534 14535@Article{Veillon:1974:AAN, 14536 author = "F. Veillon", 14537 title = "{ACM} Algorithm 486: Numerical Inversion of {Laplace} Transform", 14538 journal = j-CACM, 14539 volume = "17", 14540 number = "10", 14541 pages = "587--589 (or 587--588??)", 14542 month = oct, 14543 year = "1974", 14544 CODEN = "CACMA2", 14545 ISSN = "0001-0782", 14546 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14547 note = "See also \cite{Koppelaar:1976:RNI,Veillon:1977:RNI}.", 14548 acknowledgement = ack-nhfb, 14549 classcodes = "B0230 (Integral transforms); C1130 (Integral transforms); C7310 (Mathematics computing)", 14550 corpsource = "Univ. Grenoble, France", 14551 keywords = "computers; inversion; Laplace transform; Laplace transforms; natural sciences applications of; numerical inversion; subroutines", 14552 treatment = "A Application; T Theoretical or Mathematical", 14553} 14554 14555@Article{Koppelaar:1974:CRA, 14556 author = "H. Koppelaar", 14557 title = "Certification and remark on algorithm 191", 14558 journal = j-CACM, 14559 volume = "17", 14560 number = "10", 14561 pages = "589--590", 14562 month = oct, 14563 year = "1974", 14564 CODEN = "CACMA2", 14565 ISSN = "0001-0782", 14566 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14567 acknowledgement = ack-nhfb, 14568 classcodes = "C7310 (Mathematics computing)", 14569 corpsource = "Utrecht State Univ., Netherlands", 14570 keywords = "algorithm; hypergeometric; improvements; inefficiency; natural sciences applications of computers; subroutines", 14571 treatment = "G General Review; T Theoretical or Mathematical", 14572} 14573 14574@Article{Proll:1974:CRQ, 14575 author = "L. G. Proll", 14576 title = "A computer routine for quadratic and linear programming problems", 14577 journal = j-CACM, 14578 volume = "17", 14579 number = "10", 14580 pages = "590--590", 14581 month = oct, 14582 year = "1974", 14583 CODEN = "CACMA2", 14584 ISSN = "0001-0782", 14585 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14586 acknowledgement = ack-nhfb, 14587 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C7310 (Mathematics computing)", 14588 corpsource = "Univ. Leeds, UK", 14589 keywords = "algorithm; computer routine; computers; linear programming; natural sciences applications of; programming; quadratic and linear; quadratic programming; subroutines", 14590 treatment = "T Theoretical or Mathematical", 14591} 14592 14593@Article{Klemes:1974:RFM, 14594 author = "J. Klemes and J. Klemsa", 14595 title = "{Rosenbrock} function minimization", 14596 journal = j-CACM, 14597 volume = "17", 14598 number = "10", 14599 pages = "590--591", 14600 month = oct, 14601 year = "1974", 14602 CODEN = "CACMA2", 14603 ISSN = "0001-0782", 14604 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14605 acknowledgement = ack-nhfb, 14606 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C7310 (Mathematics computing)", 14607 corpsource = "CHEPOS, Brno, Czechoslovakia", 14608 keywords = "algorithm; minimisation; natural sciences applications of computers; Rosenbrock function minimization", 14609 treatment = "T Theoretical or Mathematical", 14610} 14611 14612@Article{Krogh:1974:EEI, 14613 author = "Fred T. Krogh", 14614 title = "Errata: ``{Efficient Implementation of a Variable Projection Algorithm for Nonlinear Least Squares}''", 14615 journal = j-CACM, 14616 volume = "17", 14617 number = "10", 14618 pages = "591--591", 14619 month = oct, 14620 year = "1974", 14621 CODEN = "CACMA2", 14622 ISSN = "0001-0782", 14623 bibdate = "Tue May 28 14:52:27 1996", 14624 note = "See \cite{Krogh:1974:EIV}.", 14625 acknowledgement = ack-nhfb, 14626} 14627 14628@Article{Gilchrist:1974:EFP, 14629 author = "Bruce Gilchrist and Richard E. Weber", 14630 title = "Enumerating Full-Time Programmers", 14631 journal = j-CACM, 14632 volume = "17", 14633 number = "10", 14634 pages = "592--593", 14635 month = oct, 14636 year = "1974", 14637 CODEN = "CACMA2", 14638 ISSN = "0001-0782", 14639 bibdate = "Thu Jan 16 19:52:47 MST 1997", 14640 bibsource = "Compendex database", 14641 abstract = "Data from the 1970 Census and the Department of Labor's Area Wage Surveys are used to derive estimates of the number of full-time programmers employed during the years 1969 through 1973. The 1973 figure of 180,000 is considerably less than suggested in earlier reports. It is recommended that educational administrators consider whether the many courses aimed at training programmers are justified on a vocational basis.", 14642 acknowledgement = ack-nhfb, 14643 classification = "723; 912", 14644 journalabr = "Commun ACM", 14645 keywords = "computer programming", 14646} 14647 14648@Article{Sterling:1974:GHC, 14649 author = "Theodor D. Sterling", 14650 title = "Guidelines for Humanizing Computerized Information Systems, {A} Report from Stanley House", 14651 journal = j-CACM, 14652 volume = "17", 14653 number = "11", 14654 pages = "609--613", 14655 month = nov, 14656 year = "1974", 14657 CODEN = "CACMA2", 14658 ISSN = "0001-0782", 14659 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14660 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 14661 abstract = "This report is the result of an intensive analysis of conditions that may humanize or dehumanize participants in various computerized systems. The guidelines presented here were generated during a week-long workshop sponsored in August 1973 by Canada Council at Canada Council's Stanley House.", 14662 acknowledgement = ack-nhfb, 14663 classcodes = "C0200 (General computer topics); C7100 (Business and administration)", 14664 classification = "723; 901", 14665 corpsource = "Simon Fraser Univ., Burnaby, BC, Canada", 14666 journalabr = "Commun ACM", 14667 keywords = "computerized information systems; economic and sociological effects; guidelines; humanizing; information retrieval systems; management information; systems", 14668 treatment = "G General Review", 14669} 14670 14671@Article{Ferrari:1974:ILC, 14672 author = "Domenico Ferrari", 14673 title = "Improving Locality by Critical Working Sets", 14674 journal = j-CACM, 14675 volume = "17", 14676 number = "11", 14677 pages = "614--620", 14678 month = nov, 14679 year = "1974", 14680 CODEN = "CACMA2", 14681 ISSN = "0001-0782", 14682 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14683 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/cache.bib", 14684 abstract = "A new approach to program locality improvement via restructuring is described. The method is particularly suited to those systems where primary memory is managed according to a working set strategy. It is based on the concept of critical working set, a working set which does not contain the next memory reference. The data the method operates upon are extracted from a trace of the program to be restructured. It is shown that, except in some special cases, the method is not optimum. However, the experimental results obtained by using the method to restructure an interactive text editor and the file system module of an operating system have shown its substantial superiority over the other methods proposed in the literature.", 14685 acknowledgement = ack-nhfb, 14686 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 14687 classification = "723", 14688 corpsource = "Univ. California, Berkeley, CA, USA", 14689 journalabr = "Commun ACM", 14690 keywords = "computer systems programming; critical working set; dynamic restructuring; file organisation; improvement; locality; memory hierarchies; multiprogramming; program restructuring; program segmentation; restructuring; restructuring techniques; static; virtual memory; working set strategy", 14691 treatment = "P Practical", 14692} 14693 14694@Article{Miller:1974:LPS, 14695 author = "Perry Lowell Miller", 14696 title = "A locally-organized parser for spoken input", 14697 journal = j-CACM, 14698 volume = "17", 14699 number = "11", 14700 pages = "621--630", 14701 month = nov, 14702 year = "1974", 14703 CODEN = "CACMA2", 14704 ISSN = "0001-0782", 14705 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14706 bibsource = "Compendex database", 14707 abstract = "This paper describes LPARS, a locally-organized parsing system, designed for use in a continuous speech recognizer. LPARS processes a string of phonemes which contains ambiguity and error. The system is locally-organized in the sense that it builds local parse structures from reliable word candidates recognized anywhere in an input utterance. These local structures are used as ``islands of reliability'' to guide the search for more highly garbled words which might complete the utterance.", 14708 acknowledgement = ack-nhfb, 14709 classcodes = "C5530 (Pattern recognition and computer vision equipment)", 14710 classification = "723; 751", 14711 corpsource = "MIT, Cambridge, MA, USA", 14712 journalabr = "Commun ACM", 14713 keywords = "augmented; local parsing; parsing; speech recognition; speech understanding; transition networks", 14714 treatment = "P Practical", 14715} 14716 14717@Article{Rader:1974:MCS, 14718 author = "Gary M. Rader", 14719 title = "Method for Composing Simple Traditional Music by Computer", 14720 journal = j-CACM, 14721 volume = "17", 14722 number = "11", 14723 pages = "631--638", 14724 month = nov, 14725 year = "1974", 14726 CODEN = "CACMA2", 14727 ISSN = "0001-0782", 14728 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14729 bibsource = "Compendex database", 14730 abstract = "A method is described for composing musical rounds by computer. This method uses some music theory plus additional heuristics. Fundamental to the method is a set of productions together with sets of applicability rules and weight rules which operate on the productions deciding when and to what extent they are available for use. Several rounds generated by the computer implementation of the method are presented. Generally, the resultant music sounds mediocre to the professional although usually pleasing to the layman. It appears that full-blown music theory is not needed for rounds --- all the hardware required for structural levels is not necessary for these pieces. The author has tried to address both musicians and computer scientists.", 14731 acknowledgement = ack-nhfb, 14732 classcodes = "C1230 (Artificial intelligence); C7820 (Humanities computing)", 14733 classification = "461; 723; 912", 14734 corpsource = "Univ. Pennsylvania, Philadelphia, PA, USA", 14735 journalabr = "Commun ACM", 14736 keywords = "artificial intelligence; computer composition; computer music; formal; heuristic programming; humanities; languages; models of cognitive processes; music theory; probabilistic grammars; systems science and cybernetics; traditional musical rounds", 14737 treatment = "A Application; P Practical", 14738} 14739 14740@Article{Freiburghouse:1974:RAU, 14741 author = "R. A. Freiburghouse", 14742 title = "Register Allocation via Usage Counts", 14743 journal = j-CACM, 14744 volume = "17", 14745 number = "11", 14746 pages = "638--642", 14747 month = nov, 14748 year = "1974", 14749 CODEN = "CACMA2", 14750 ISSN = "0001-0782", 14751 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14752 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib", 14753 abstract = "This paper introduces the notion of usage counts, shows how usage counts can be developed by algorithms that eliminate redundant computations, and describes how usage counts can provide the basis for register allocation. The paper compares register allocation based on usage counts to other commonly used register allocation techniques, and presents evidence which shows that the usage count technique is significantly better than these other techniques.", 14754 acknowledgement = ack-nhfb, 14755 classcodes = "C6110 (Systems analysis and programming); C6120 (File organisation)", 14756 classification = "723", 14757 corpsource = "Honeywell Information Systems Inc., Cambridge, MA, USA", 14758 journalabr = "Commun ACM", 14759 keywords = "common subexpressions; compilers; computations; computer programming; demand paging; languages; optimization; programming; redundant; register allocation; storage allocation; usage counts; virtual memory", 14760 treatment = "P Practical", 14761} 14762 14763@Article{Dijkstra:1974:SSS, 14764 author = "E. W. Dijkstra", 14765 title = "Self-stabilizing Systems in Spite of Distributed Control", 14766 journal = j-CACM, 14767 volume = "17", 14768 number = "11", 14769 pages = "643--644", 14770 month = nov, 14771 year = "1974", 14772 CODEN = "CACMA2", 14773 ISSN = "0001-0782", 14774 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14775 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/traces.bib", 14776 acknowledgement = ack-nhfb, 14777 classcodes = "C4220 (Automata theory); C6150J (Operating systems)", 14778 corpsource = "Burroughs Corp., Nuenen, Netherlands", 14779 keywords = "(computers); automata theory; distributed control; error recovery; fault tolerant computing; harmonious cooperation; multiprocessing; mutual exclusion; networks; operating systems; robustness; self repair; self stabilization; sharing; synchronization", 14780 treatment = "T Theoretical or Mathematical", 14781} 14782 14783@Article{Brown:1974:ODM, 14784 author = "J. A. Brown and B. Werner", 14785 title = "An on-site data management system application in field archaeology", 14786 journal = j-CACM, 14787 volume = "17", 14788 number = "11", 14789 pages = "644--646", 14790 month = nov, 14791 year = "1974", 14792 CODEN = "CACMA2", 14793 ISSN = "0001-0782", 14794 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14795 acknowledgement = ack-nhfb, 14796 classcodes = "C6120 (File organisation); C7820 (Humanities computing)", 14797 corpsource = "Northwestern Univ., Evanston, IL, USA", 14798 keywords = "APL-PLUS; archaeology; data management system; field archaeology; file organisation; on site; prehistoric site; retrieval systems", 14799 treatment = "A Application; P Practical", 14800} 14801 14802@Article{Hanson:1974:STR, 14803 author = "D. R. Hanson", 14804 title = "A simple technique for representing strings in {Fortran IV}", 14805 journal = j-CACM, 14806 volume = "17", 14807 number = "11", 14808 pages = "646--647", 14809 month = nov, 14810 year = "1974", 14811 CODEN = "CACMA2", 14812 ISSN = "0001-0782", 14813 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14814 acknowledgement = ack-nhfb, 14815 classcodes = "C6110 (Systems analysis and programming); C6120 (File organisation); C6140D (High level languages)", 14816 corpsource = "Univ. Arizona, Tucson, AZ, USA", 14817 keywords = "data structures; FORTRAN; FORTRAN IV; programming; representing strings; string processing; structured", 14818 treatment = "P Practical", 14819} 14820 14821@Article{VanRijsbergen:1974:BPD, 14822 author = "C. J. {Van Rijsbergen}", 14823 title = "The best-match problem in document retrieval", 14824 journal = j-CACM, 14825 volume = "17", 14826 number = "11", 14827 pages = "648--649", 14828 month = nov, 14829 year = "1974", 14830 CODEN = "CACMA2", 14831 ISSN = "0001-0782", 14832 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14833 acknowledgement = ack-nhfb, 14834 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 14835 corpsource = "Monash Univ., Clayton, Vic., Australia", 14836 keywords = "best match; classification; clustering; dissimilarity; document retrieval; file searching; hierarchy; information retrieval; matching", 14837 treatment = "T Theoretical or Mathematical", 14838} 14839 14840@Article{Evans:1974:MEL, 14841 author = "R. V. Evans", 14842 title = "Multiple exits from a loop using neither {GO TO} nor labels", 14843 journal = j-CACM, 14844 volume = "17", 14845 number = "11", 14846 pages = "650--650", 14847 month = nov, 14848 year = "1974", 14849 CODEN = "CACMA2", 14850 ISSN = "0001-0782", 14851 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14852 acknowledgement = ack-nhfb, 14853 classcodes = "C6110 (Systems analysis and programming)", 14854 corpsource = "ICL Dataskil, Reading, UK", 14855 keywords = "control structures; exit statement; GO TO; go to free programming; labels; multiple exits from loops; programming", 14856 treatment = "P Practical", 14857} 14858 14859@Article{Knuth:1974:CPA, 14860 author = "Donald E. Knuth", 14861 title = "Computer Programming as an Art", 14862 journal = j-CACM, 14863 volume = "17", 14864 number = "12", 14865 pages = "667--673", 14866 month = dec, 14867 year = "1974", 14868 CODEN = "CACMA2", 14869 ISSN = "0001-0782", 14870 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14871 bibsource = "Compendex database", 14872 note = "French translation, with three supplementary paragraphs, in {\sl L'Informatique Nouvelle}, No.\ 64 (June 1975), 20--27. Japanese translation by Makoto Arisawa in {\sl bit\/ \bf 7} (1975), 434--444; reprinted in {\sl Kunusu Sensei no Program-Ron\/} (see under Books), 2--19. English version reprinted with the supplementary paragraphs in {\sl ACM Turing Award Lectures: The First Twenty Years} (New York: ACM Press, 1987), 33--46; reprinted with corrections in \cite[pp.~1--16]{Knuth:1992:LP}. Russian translation by V. V. Martyn\t iuk in {\sl Lektsii laureatov premii T'\t\i uringa\/} (Moscow: Mir, 1993), 48--64.", 14873 abstract = "Discussion emphasizes that computer programming is an art as well as a science.", 14874 acknowledgement = ack-nhfb, 14875 classcodes = "C6110 (Systems analysis and programming)", 14876 classification = "723", 14877 corpsource = "Stanford Univ., CA, USA", 14878 journalabr = "Commun ACM", 14879 keywords = "art; computer; computer programming; programming; quality", 14880 treatment = "G General Review; P Practical", 14881} 14882 14883@Article{Press:1974:AMC, 14884 author = "Laurance I. Press", 14885 title = "Arguments for a Moratorium on the Construction of a Community Information Utility", 14886 journal = j-CACM, 14887 volume = "17", 14888 number = "12", 14889 pages = "674--678", 14890 month = dec, 14891 year = "1974", 14892 CODEN = "CACMA2", 14893 ISSN = "0001-0782", 14894 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14895 bibsource = "Compendex database", 14896 abstract = "In this article the author urges a prudent and decentralized approach to the question of the design and desirability of computerized community information utilities. Current proposals for community information utilities are examined in this framework, and the conclusion is drawn that society is not yet in a position to justify either the construction of an information utility in a prototype community or the acceptance of a policy in favor of its widespread implementation.", 14897 acknowledgement = ack-nhfb, 14898 classcodes = "C7210 (Information services and centres)", 14899 classification = "723", 14900 corpsource = "Univ. Southern California, Los Angeles, CA, USA", 14901 journalabr = "Commun ACM", 14902 keywords = "community information utility; construction; decentralized; demand; design; desirability; effects; feasibility; information services; side; techniques; users; world view", 14903 treatment = "G General Review", 14904} 14905 14906@Article{Strauss:1974:AMH, 14907 author = "J. C. Strauss", 14908 title = "An analytic model of the {Hasp} execution task monitor", 14909 journal = j-CACM, 14910 volume = "17", 14911 number = "12", 14912 pages = "679--685", 14913 month = dec, 14914 year = "1974", 14915 CODEN = "CACMA2", 14916 ISSN = "0001-0782", 14917 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14918 bibsource = "Compendex database", 14919 abstract = "A simple analytic model has been developed for investigating the effects of the HASP Execution Task Monitor on the performance of a multiprogramming system. A specific example is worked through in detail, and numerical results are reported. The model demonstrates the effect of the HETM priority algorithm and permits the evaluation of possible modifications to the algorithm.", 14920 acknowledgement = ack-nhfb, 14921 classcodes = "C6150G (Diagnostic, testing, debugging and evaluating systems); C6150J (Operating systems)", 14922 classification = "723", 14923 corpsource = "Washington Univ., St. Louis, MO, USA", 14924 journalabr = "Commun ACM", 14925 keywords = "(computers); analytic model; computer selection and evaluation; computer systems programming; dispatching; execution task monitor; HASP; hasp execution task monitor; operating systems; OS/360; performance evaluation; scheduling", 14926 treatment = "A Application; T Theoretical or Mathematical", 14927} 14928 14929@Article{Adam:1974:CLS, 14930 author = "Thomas L. Adam and K. M. Chandy and J. R. Dickson", 14931 title = "A Comparison of List Schedules for Parallel Processing Systems", 14932 journal = j-CACM, 14933 volume = "17", 14934 number = "12", 14935 pages = "685--690", 14936 month = dec, 14937 year = "1974", 14938 CODEN = "CACMA2", 14939 ISSN = "0001-0782", 14940 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14941 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/OVR.bib", 14942 abstract = "The problem of scheduling two or more processors to minimize the execution time of a program which consists of a set of partially ordered tasks is studied. Cases where task execution times are deterministic and others in which execution times are random variables are analyzed. It is shown that different algorithms suggested in the literature vary significantly in execution time and that the B-schedule of Coffman and Graham is near-optimal. A dynamic programming solution for the case in which execution times are random variables is presented.", 14943 acknowledgement = ack-nhfb, 14944 classcodes = "C5400 (Analogue and digital computers and systems); C6150J (Operating systems)", 14945 classification = "722", 14946 corpsource = "Univ. Texas, Austin, TX, USA", 14947 journalabr = "Commun ACM", 14948 keywords = "comparison; computer systems, digital; dynamic programming; list schedules; list scheduling; optimisation; optimization; parallel processing; parallel processing systems; precedence graphs; scheduling", 14949 treatment = "A Application; T Theoretical or Mathematical", 14950} 14951 14952@Article{Wallace:1974:CGG, 14953 author = "N. D. Wallace", 14954 title = "Computer Generation of Gamma Random Variates with Non-Integral Shape Parameters", 14955 journal = j-CACM, 14956 volume = "17", 14957 number = "12", 14958 pages = "691--695", 14959 month = dec, 14960 year = "1974", 14961 CODEN = "CACMA2", 14962 ISSN = "0001-0782", 14963 MRclass = "65C10", 14964 MRnumber = "51 11920", 14965 mrreviewer = "R. R. Coveyou", 14966 bibdate = "Tue Mar 25 13:26:09 MST 1997", 14967 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib", 14968 abstract = "When the shape parameter, alpha, is integral, generating gamma random variables with a digital computer is straightforward. There is no simple method for generating gamma random variates with non-integral shape parameters. A common procedure is to approximately generate such random variables by the use of the so-called probability switch method. Another procedure, which is exact, is due to Joehnk. This paper presents a rejection method for exactly generating gamma random variables when alpha is greater than 1. The efficiency of the rejection method is shown to be better than the efficiency of M. D. Joehnk's method. The paper concludes that when alpha is non-integral, the following mix of procedures yields the best combination of accuracy and efficiency: (1) when alpha is less than 1, use Joehnk's method; (2) when 1 is less than alpha and alpha is less than 5, use the rejection method; (3) when alpha is greater than 5, use the probability switch method.", 14969 acknowledgement = ack-nhfb, 14970 classcodes = "C7890 (Other special applications of computing)", 14971 classification = "922", 14972 corpsource = "Southern Illinois Univ., Edwardsville, IL, USA", 14973 country = "USA", 14974 descriptors = "RVG;", 14975 enum = "8007", 14976 journalabr = "Commun ACM", 14977 keywords = "computer generation; gamma random variables; probability; probability distribution; random number generation; random numbers; simulation", 14978 language = "English", 14979 location = "SEL: Wi", 14980 references = "0", 14981 revision = "16/01/94", 14982 treatment = "A Application; T Theoretical or Mathematical", 14983} 14984 14985@Article{Salazar:1974:GFS, 14986 author = "A. Salazar and R. V. Oakford", 14987 title = "A Graph Formulation of a School Scheduling Algorithm", 14988 journal = j-CACM, 14989 volume = "17", 14990 number = "12", 14991 pages = "696--698", 14992 month = dec, 14993 year = "1974", 14994 CODEN = "CACMA2", 14995 ISSN = "0001-0782", 14996 MRclass = "90B35", 14997 MRnumber = "51 12313", 14998 mrreviewer = "I. Gh. Ciobanu", 14999 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15000 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib", 15001 note = "See \cite{Korfhage:1975:SO,Korfhage:1975:MSO,Garey:1975:SO}.", 15002 abstract = "The problem classically titled ``The Examination Schedule Problem'' takes various forms in the literature. Most of these formulations can be presented in the terminology of classical Network Theory. \par One such formulation is: Given a nondirected network, partition its nodes into a minimal number of subsets such that no two members of the same subset are connected by an arc. An obvious lower limit to this number is the size of the largest strongly connected subgraph. Kirchgassner proved that an upper limit is this size plus one. One logical extension of the previous work is the introduction of variable length examinations where $W(I)$ is the number of periods for exam $I$. The object of this paper is to generalize the definition of largest strongly connected subgraph to include the weighting of nodes, to present an approximate algorithm which usually finds the largest strongly connected subgraph, and to discuss the application of this algorithm to the solution of school scheduling and exam scheduling problems.", 15003 acknowledgement = ack-nhfb, 15004 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C1290F (Systems theory applications in industry)C7110 (Educational administration)", 15005 classification = "723; 921", 15006 corpsource = "Stanford Univ., CA, USA", 15007 journalabr = "Commun ACM", 15008 keywords = "computer programming --- Subroutines; data processing; educational administrative data processing; examination; examination scheduling; graph; graph coloring; graph theory; mathematical techniques --- Graph Theory; nondirected network; scheduling; school; school scheduling; strongly connected; strongly connected subgraph; subgraph", 15009 treatment = "A Application; T Theoretical or Mathematical", 15010} 15011 15012@Article{Chu:1974:EMS, 15013 author = "Sherwood C. Chu and Mones Berman", 15014 title = "An Exponential Method for the Solution of Systems of Ordinary Differential Equations", 15015 journal = j-CACM, 15016 volume = "17", 15017 number = "12", 15018 pages = "699--702", 15019 month = dec, 15020 year = "1974", 15021 CODEN = "CACMA2", 15022 ISSN = "0001-0782", 15023 MRclass = "65L99", 15024 MRnumber = "51 4685", 15025 mrreviewer = "W. H. Enright", 15026 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15027 bibsource = "Compendex database", 15028 abstract = "An explicit, coupled, single-step method for the numerical solution of initial value problems for systems of ordinary differential equations is presented. \par The method was designed to be general purpose in nature but to be especially efficient when dealing with stiff systems of differential equations. It is, in general, second order except for the case of a linear system with constant coefficients and linear forcing terms; in that case, the method is third order. It has been implemented and put to routine usage in biological applications-where stiffness frequently appears-with favorable results. When compared to a standard fourth order Runge-Kutta implementation, computation time required by this method has ranged from comparable for certain nonstiff problems to better than two orders of magnitude faster for some highly stiff systems.", 15029 acknowledgement = ack-nhfb, 15030 classcodes = "B0290P (Differential equations); C4170 (Differential equations)", 15031 classification = "921", 15032 corpsource = "Nat. Cancer Inst., Bethesda, MD, USA", 15033 journalabr = "Commun ACM", 15034 keywords = "boundary-value problems; initial; initial value problems; mathematical techniques; numerical methods; numerical solution; ordinary differential equations; stiff systems; value problems", 15035 treatment = "T Theoretical or Mathematical", 15036} 15037 15038@Article{Pomeranz:1974:AAE, 15039 author = "J. Pomeranz", 15040 title = "{ACM} Algorithm 487: Exact Cumulative Distribution of the {Kolmogorov-Smirnov} Statistic for Small Samples", 15041 journal = j-CACM, 15042 volume = "17", 15043 number = "12", 15044 pages = "703--704", 15045 month = dec, 15046 year = "1974", 15047 CODEN = "CACMA2", 15048 ISSN = "0001-0782", 15049 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15050 note = "See also \cite{Pomeranz:1976:REC}.", 15051 acknowledgement = ack-nhfb, 15052 classcodes = "C7310 (Mathematics computing)", 15053 corpsource = "Purdue Univ., West Lafayette, IN, USA", 15054 keywords = "algorithm; exact cumulative distribution; FORTRAN; Kolmogorov Smirnov test; natural sciences applications of computers; small samples; statistic; statistics; subroutines", 15055 treatment = "A Application; T Theoretical or Mathematical", 15056} 15057 15058@Article{Brent:1974:AAG, 15059 author = "R. P. Brent", 15060 title = "{ACM} Algorithm 488: {A} {Gaussian} pseudo-random number generator [{G5}]", 15061 journal = j-CACM, 15062 volume = "17", 15063 number = "12", 15064 pages = "704--706 (or 704--705??)", 15065 month = dec, 15066 year = "1974", 15067 CODEN = "CACMA2", 15068 ISSN = "0001-0782", 15069 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15070 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib", 15071 acknowledgement = ack-nhfb, 15072 classcodes = "C7890 (Other special applications of computing)", 15073 corpsource = "Australian Nat. Univ., Canberra, Australia", 15074 country = "USA", 15075 descriptors = "RVG;", 15076 enum = "7061", 15077 keywords = "distribution; FORTRAN; Gaussian; generator; GRAND; normal distribution; pseudo random numbers; random number generation; random numbers; subroutines", 15078 language = "English", 15079 location = "SEL: Wi", 15080 references = "0", 15081 revision = "16/01/94", 15082 treatment = "A Application; T Theoretical or Mathematical", 15083} 15084 15085@Article{Skinner:1974:HAI, 15086 author = "C. William Skinner", 15087 title = "Heuristic Approach to Inductive Inference in Fact Retrieval Systems", 15088 journal = j-CACM, 15089 volume = "17", 15090 number = "12", 15091 pages = "707--712", 15092 month = dec, 15093 year = "1974", 15094 CODEN = "CACMA2", 15095 ISSN = "0001-0782", 15096 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15097 bibsource = "Compendex database", 15098 abstract = "Heuristic procedures are presented which have been developed to perform inferences by generalizing from available information. The procedures make use of a similarity structure which is imposed on the data base using nonnumerical clustering algorithms. They are implemented in a model fact retrieval system which uses a formal query language and a property-list data structure. A program of experiments is described wherein the procedures are used with test data bases which are altered by deleting part of the data and by purposely introducing false data. It is found that the system can infer the correct response under a variety of conditions involving incomplete and inconsistent data.", 15099 acknowledgement = ack-nhfb, 15100 classcodes = "C6120 (File organisation); C7100 (Business and administration); C7250 (Information storage and retrieval)", 15101 classification = "723; 901", 15102 corpsource = "North Carolina State Univ., Raleigh, NC, USA", 15103 journalabr = "Commun ACM", 15104 keywords = "clustering; fact retrieval; file organisation; formal query language; heuristic programming; heuristics; inductive; inference; information; information retrieval systems; management information systems; retrieval systems", 15105 treatment = "A Application; T Theoretical or Mathematical", 15106} 15107 15108@Article{Mitra:1974:SAH, 15109 author = "D. Mitra", 15110 title = "Some Aspects of Hierarchical Memory Systems", 15111 journal = j-CACM, 15112 volume = "21", 15113 number = "1", 15114 pages = "54--65", 15115 month = jan, 15116 year = "1974", 15117 CODEN = "CACMA2", 15118 ISSN = "0001-0782", 15119 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/storage.bib", 15120 keywords = "memory hierarchy; Performance Evaluation: Analytic", 15121} 15122 15123@Article{Millstein:1975:CSI, 15124 author = "R. E. Millstein", 15125 title = "Control Structures in {Illiac IV Fortran}", 15126 journal = j-CACM, 15127 volume = "6", 15128 number = "10", 15129 pages = "157--164", 15130 month = oct, 15131 year = "1975", 15132 CODEN = "CACMA2", 15133 ISSN = "0001-0782", 15134 bibdate = "Tue Sep 20 22:19:34 1994", 15135 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 15136} 15137 15138@Article{Sterling:1975:CHL, 15139 author = "T. Sterling and V. Lum and N. Shu and B. Housel", 15140 title = "{\em CONVERT\/}: {A} High Level Translation Definition Language for Data Conversion", 15141 journal = j-CACM, 15142 volume = "8", 15143 number = "10", 15144 pages = "557--567", 15145 month = oct, 15146 year = "1975", 15147 CODEN = "CACMA2", 15148 ISSN = "0001-0782", 15149 bibdate = "Mon Feb 12 14:34:00 1996", 15150 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib", 15151 abstract = "This paper describes a high level and nonprocedural translation definition language, CONVERT, which provides very powerful and highly flexible data restructuring capabilities. Its design is based on the simple underlying concept of a form which enables the users to visualize the translation processes, and thus makes data translation a much simpler task. ``CONVERT'' has been chosen for conveying the purpose of the language and should not be confused with any other language or program bearing the same name.", 15152 annote = "A full description of the CONVERT language is given. It is fairly complete, and dealt well with record oriented systems. A good set of examples is given.", 15153 keywords = "data conversion; data restructuring; data translation; database reorganization; nonprocedural languages; programming languages; translation definition; utility program", 15154 owner = "curtis", 15155} 15156 15157@Article{Finerman:1975:PCF, 15158 author = "Aaron Finerman", 15159 title = "Professionalism in the Computing Field", 15160 journal = j-CACM, 15161 volume = "18", 15162 number = "1", 15163 pages = "4--9", 15164 month = jan, 15165 year = "1975", 15166 CODEN = "CACMA2", 15167 ISSN = "0001-0782", 15168 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15169 bibsource = "Compendex database", 15170 abstract = "Each of the four types of institutions --- academic, industry, government, and the professional society --- that educate, employ, regulate, and mold the practitioner contributes to the ``nonprofessional'' status of the computing practitioner. The roles of these institutions are examined, various shortcomings are noted, and recommended changes are suggested.", 15171 acknowledgement = ack-nhfb, 15172 classcodes = "C0200 (General computer topics)", 15173 classification = "723; 912", 15174 corpsource = "State Univ. of New York, Stony Brook, NY, USA", 15175 journalabr = "Commun ACM", 15176 keywords = "academic; computers; computing; computing practitioner; economic and sociological effects; education; educational programmes; employment; government; industry; professional society; professionalism; social standards; technical standards", 15177 treatment = "G General Review; P Practical", 15178} 15179 15180@Article{Bauer:1975:PN, 15181 author = "F. L. Bauer", 15182 title = "Positivity and Norms", 15183 journal = j-CACM, 15184 volume = "18", 15185 number = "1", 15186 pages = "9--13", 15187 month = jan, 15188 year = "1975", 15189 CODEN = "CACMA2", 15190 ISSN = "0001-0782", 15191 MRclass = "65F35 (15A60 47A30)", 15192 MRnumber = "54 6476", 15193 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15194 bibsource = "Compendex database", 15195 note = "Collection of articles honoring {Alston S. Householder}.", 15196 abstract = "Following some lines of joint work with A. S. Householder, the character and use of algebraic methods in the theory of norms is demonstrated. New results concerning norms with values in an Archimedian vector lattice (not necessarily being totally ordered) are given, in particular for the generalization of order unit norms, L-norms and M-norms. An example of application to operator norms is given concerning contraction properties of positive operators.", 15197 acknowledgement = ack-nhfb, 15198 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 15199 classification = "921", 15200 corpsource = "Math. Inst., Tech. Univ. of Munich, Munich, West Germany", 15201 journalabr = "Commun ACM", 15202 keywords = "absolute; algebraic methods; Archimedian vector lattice; contraction; L norms; M norms; mathematical techniques; matrices; matrix algebra; methods; monotonic; norms; numerical; numerical methods; numerical range; operator norms; order; positive operators; positivity; positivity cones; properties; unit norms; vector lattice; vectors", 15203 treatment = "T Theoretical or Mathematical", 15204} 15205 15206@Article{Todd:1975:LC, 15207 author = "John Todd", 15208 title = "The Lemniscate Constants", 15209 journal = j-CACM, 15210 volume = "18", 15211 number = "1", 15212 pages = "14--19", 15213 month = jan, 15214 year = "1975", 15215 CODEN = "CACMA2", 15216 ISSN = "0001-0782", 15217 MRclass = "65D20", 15218 MRnumber = "51 11935", 15219 mrreviewer = "L. Fox", 15220 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15221 bibsource = "Compendex database", 15222 note = "Collection of articles honoring {Alston S. Householder}. See corrigendum \cite{Todd:1975:CLC}.", 15223 abstract = "The lemniscate constants, and indeed some of the methods used for actually computing them, have played an enormous part in the development of mathematics. An account is given here of some of the methods used --- most of the derivations can be made by elementary methods. This material can be used for teaching purposes, and there is much relevant and interesting historical material. The acceleration methods developed for the purpose of evaluating these constants are useful in other problems.", 15224 acknowledgement = ack-nhfb, 15225 classcodes = "B0290D (Functional analysis); B0290Z (Other numerical methods); C4120 (Functional analysis); C4190 (Other numerical methods)", 15226 classification = "921", 15227 corpsource = "California Inst. of Technol., Pasadena, CA, USA", 15228 journalabr = "Commun ACM", 15229 keywords = "acceleration; acceleration methods; elliptic functions; Euler transformation; function evaluation; lemniscate; lemniscate constants; mathematical techniques; mathematics; transforms", 15230 treatment = "B Bibliography; T Theoretical or Mathematical", 15231} 15232 15233@Article{Peters:1975:SGJ, 15234 author = "G. Peters and J. H. Wilkinson", 15235 title = "On the Stability of {Gauss-Jordan} Elimination with Pivoting", 15236 journal = j-CACM, 15237 volume = "18", 15238 number = "1", 15239 pages = "20--24", 15240 month = jan, 15241 year = "1975", 15242 CODEN = "CACMA2", 15243 ISSN = "0001-0782", 15244 MRclass = "65F05 (65G05)", 15245 MRnumber = "51 7261", 15246 mrreviewer = "L. B. Rall", 15247 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15248 bibsource = "Compendex database", 15249 note = "Collection of articles honoring {Alston S. Householder}", 15250 abstract = "The stability of the Gauss-Jordan algorithm with partial pivoting for the solution of general systems of linear equations is commonly regarded as suspect. \par It is shown that in many respects suspicions are unfounded, and in general the absolute error in the solution is strictly comparable with that corresponding to Gaussian elimination with partial pivoting plus back substitution. However, when A is ill conditioned, the residual corresponding to the Gauss-Jordan solution will often be much greater than that corresponding to the Gaussian elimination solution.", 15251 acknowledgement = ack-nhfb, 15252 classcodes = "B0290B (Error analysis in numerical methods); B0290H (Linear algebra); C4110 (Error analysis in numerical methods); C4140 (Linear algebra)", 15253 classification = "921", 15254 corpsource = "Nat. Phys. Lab., Teddington, UK", 15255 journalabr = "Commun ACM", 15256 keywords = "back-substitution; backward error analysis; bound for residual; bounds for error in solution; Gauss-Jordan algorithm; Gaussian elimination; mathematical techniques", 15257 keywords = "absolute error; elimination; error analysis; Gauss Jordan algorithm; Gauss/Jordan; Gaussian elimination; linear algebra; linear equations; numerical methods; stability", 15258 treatment = "T Theoretical or Mathematical", 15259} 15260 15261@Article{Birkhoff:1975:THN, 15262 author = "Garrett Birkhoff", 15263 title = "Two {Hadamard} Numbers for Matrices", 15264 journal = j-CACM, 15265 volume = "18", 15266 number = "1", 15267 pages = "25--29", 15268 month = jan, 15269 year = "1975", 15270 CODEN = "CACMA2", 15271 ISSN = "0001-0782", 15272 MRclass = "65F35", 15273 MRnumber = "51 9464", 15274 mrreviewer = "John Todd", 15275 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15276 bibsource = "Compendex database", 15277 note = "Collection of articles honoring {Alston S. Householder}.", 15278 abstract = "A discussion is given of two functions of the entries of a square matrix, both related to Hadamard's determinant theorem, which have some merits as alternatives to norm-bound ``condition numbers''. One (for linear systems) is known; the other (for eigensystems) seems to be new.", 15279 acknowledgement = ack-nhfb, 15280 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 15281 classification = "921", 15282 corpsource = "Harvard Univ., Cambridge, MA, USA", 15283 journalabr = "Commun ACM", 15284 keywords = "condition numbers; eigen systems; eigenvalues; error analysis; Gram-Schmidt orthogonalization; Gram/Schmidt organisation; Hadamard numbers; Hadamard's determinant; linear systems; mathematical techniques; matrices; matrix algebra; norm bound 'condition numbers'; norms; square matrix; theorem", 15285 treatment = "T Theoretical or Mathematical", 15286} 15287 15288@Article{vanderSluis:1975:PEN, 15289 author = "A. {van der Sluis}", 15290 title = "Perturbations of Eigenvalues of Non-Normal Matrices", 15291 journal = j-CACM, 15292 volume = "18", 15293 number = "1", 15294 pages = "30--36", 15295 month = jan, 15296 year = "1975", 15297 CODEN = "CACMA2", 15298 ISSN = "0001-0782", 15299 MRclass = "65F15", 15300 MRnumber = "51 9457a", 15301 mrreviewer = "Jan Zitko", 15302 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15303 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/gvl.bib", 15304 note = "Collection of articles honoring {Alston S. Householder}. See corrigendum \cite{vanderSluis:1975:CPE}.", 15305 abstract = "The problem considered is to give bounds for finite perturbations of simple and multiple eigenvalues $lambda_i$ of nonnormal matrices, where these bounds are in terms of the eigenvalues $\{\lambda_i\}$, the departure from normality $\sigma$, and the Frobenius norm of the perturbation matrix, but not in terms of the eigensystem. The bounds which are derived are shown to be almost attainable for any set of all matrices of given $\{\lambda_i\}$ and $\sigma$.", 15306 acknowledgement = ack-nhfb, 15307 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 15308 classification = "921", 15309 corpsource = "Univ. of Utrecht, Utrecht, Netherlands", 15310 journalabr = "Commun ACM", 15311 keywords = "circles; departure from normality; eigenvalues; eigenvalues and eigenfunctions; Frobenius norm; Gershgorin; Gershgorin circles; mathematical techniques; matrix algebra; non-normal matrices; nonnormal matrices; perturbation of eigenvalues; perturbations", 15312 treatment = "T Theoretical or Mathematical", 15313} 15314 15315@Article{Marcus:1975:EDT, 15316 author = "Marvin Marcus and Herbert Robinson", 15317 title = "Elementary Divisors of Tensor Products", 15318 journal = j-CACM, 15319 volume = "18", 15320 number = "1", 15321 pages = "36--39", 15322 month = jan, 15323 year = "1975", 15324 CODEN = "CACMA2", 15325 ISSN = "0001-0782", 15326 MRclass = "15A69", 15327 MRnumber = "51 571", 15328 mrreviewer = "George P. Barker", 15329 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15330 bibsource = "Compendex database", 15331 abstract = "The elementary divisors of a tensor product of linear transformations have been known for 40 years. This paper provides a short, easily accessible proof of these results, and points out an interesting combinatorial consequence of the proof.", 15332 acknowledgement = ack-nhfb, 15333 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 15334 classification = "921", 15335 corpsource = "Univ. of California, Santa Barbara, CA, USA", 15336 journalabr = "Commun ACM", 15337 keywords = "combinatorial; combinatorial mathematics; consequence; elementary divisors; linear transformations; mathematical techniques; matrix algebra; tensor products; tensors", 15338 treatment = "T Theoretical or Mathematical", 15339} 15340 15341@Article{Hestenes:1975:PCG, 15342 author = "Magnus R. Hestenes", 15343 title = "Pseudoinverses and Conjugate Gradients", 15344 journal = j-CACM, 15345 volume = "18", 15346 number = "1", 15347 pages = "40--43", 15348 month = jan, 15349 year = "1975", 15350 CODEN = "CACMA2", 15351 ISSN = "0001-0782", 15352 MRclass = "65F20", 15353 MRnumber = "51 2269", 15354 mrreviewer = "G. Maess", 15355 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15356 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 15357 note = "Collection of articles honoring {Alston S. Householder}", 15358 abstract = "This paper is devoted to the study of connections between pseudoinverses of matrices and conjugate gradients and conjugate direction routines.", 15359 acknowledgement = ack-nhfb, 15360 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 15361 classification = "921", 15362 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 15363 journalabr = "Commun ACM", 15364 keywords = "cg; conjugate direction routines; conjugate gradients; ginv; hermitian matrix; mathematical techniques; matrices; matrix algebra; minimisation; minimization; nla; pseudoinverse; pseudoinverses", 15365 treatment = "T Theoretical or Mathematical", 15366} 15367 15368@Article{Mills:1975:NMC, 15369 author = "Harlan D. Mills", 15370 title = "The New Math of Computer Programming", 15371 journal = j-CACM, 15372 volume = "18", 15373 number = "1", 15374 pages = "43--48", 15375 month = jan, 15376 year = "1975", 15377 CODEN = "CACMA2", 15378 ISSN = "0001-0782", 15379 MRclass = "68A05", 15380 MRnumber = "51 2333a", 15381 mrreviewer = "E. Ikaunieks", 15382 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15383 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/softeng.bib", 15384 note = "Collection of articles honoring {Alston S. Householder}. See corrigendum \cite{Mills:1975:CNM}.", 15385 abstract = "Structured programming has proved to be an important methodology for systematic program design and development. Structured programs are identified as compound function expressions in the algebra of functions. The algebraic properties of these function expressions permit the reformulation (expansion as well as reduction) of a nested subexpression independently of its environment, thus modeling what is known as stepwise program refinement as well as program execution. Finally, structured programming is characterized in terms of the selection and solution of certain elementary equations defined in the algebra of functions. These solutions can be given in general formulas, each involving a single parameter, which display the entire freedom available in creating correct structure programs.", 15386 acknowledgement = ack-nhfb, 15387 classcodes = "C4240 (Programming and algorithm theory); C6110 (Systems analysis and programming)", 15388 classification = "723; 921", 15389 corpsource = "IBM Federal Systems Div., Owego, NY, USA", 15390 journalabr = "Commun ACM", 15391 keywords = "algebraic properties; compound; computer metatheory; computer programming; function expressions; mathematical techniques; program correctness; program execution; programming; programming theory; structured; systematic program design", 15392 treatment = "T Theoretical or Mathematical", 15393} 15394 15395@Article{Chen:1975:SER, 15396 author = "Tien Chi Chen and Irving T. Ho", 15397 title = "Storage-Efficient Representation of Decimal Data", 15398 journal = j-CACM, 15399 volume = "18", 15400 number = "1", 15401 pages = "49--52", 15402 month = jan, 15403 year = "1975", 15404 CODEN = "CACMA2", 15405 ISSN = "0001-0782", 15406 MRclass = "94A15 (68A20)", 15407 MRnumber = "50 16105", 15408 mrreviewer = "R. N. Goss", 15409 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15410 bibsource = "Compendex database; garbo.uwasa.fi:/pc/doc-soft/fpbiblio.txt", 15411 note = "Collection of articles honoring {Alston S. Householder}", 15412 abstract = "Usually n decimal digits are represented by 4n bits in computers. Actually, two BCD digits can be compressed optimally and reversibly into 7 bits, and three digits into 10 bits, by a very simple algorithm based on the fixed-length combination of two variable field-length encodings. In over half of the cases the compressed code results from the conventional BCD code by simple removal of redundant 0 bits. A long decimal message can be subdivided into three-digit blocks, and separately compressed; the result differs from the asymptotic minimum length by only 0.34 percent. The hardware requirement is small, and the mappings can be done manually.", 15413 acknowledgement = ack-nhfb, 15414 classcodes = "C6130 (Data handling techniques)", 15415 classification = "722; 921", 15416 corpsource = "IBM San Jose Res. Lab., CA, USA", 15417 journalabr = "Commun ACM", 15418 keywords = "data storage units; mathematical techniques --- Digital Arithmetic", 15419 keywords = "asymptotic minimum; binary coded decimal; codes; compressed code; data compression; decimal data; fixed length combination; hardware; length; length encodings; representation; storage efficient; variable field", 15420 treatment = "T Theoretical or Mathematical", 15421} 15422 15423@Article{Liniger:1975:CBA, 15424 author = "Werner Liniger", 15425 title = "Connections Between Accuracy and Stability Properties of Linear Multistep Formulas", 15426 journal = j-CACM, 15427 volume = "18", 15428 number = "1", 15429 pages = "53--56", 15430 month = jan, 15431 year = "1975", 15432 CODEN = "CACMA2", 15433 ISSN = "0001-0782", 15434 MRclass = "65L05", 15435 MRnumber = "51 2291", 15436 mrreviewer = "Ian Gladwell", 15437 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15438 bibsource = "Compendex database", 15439 note = "Collection of articles honoring {Alston S. Householder}", 15440 abstract = "This paper is concerned with stability and accuracy of families of linear $k$-step formulas depending on parameters, with particular emphasis on the numerical solution of stiff ordinary differential equations. \par An upper bound, $p=k$, is derived for the order of accuracy of $A(\infty)$-stable formulas. Three criteria are given for A$(0)$-stability. It is shown that (1) for $p=k$, $k$ arbitrary, $A(\infty)$-stability implies certain necessary conditions for $A(0)$-stability and for strict stability (meaning that the extraneous roots of $p(\psi)$ satisfy $|\psi|<1)$; (2) for $p=k=2,3,4, \mbox{and} 5$, $A(\infty)$-stability (for $k=5$ together with another constraint) implies strict stability; and (3) for certain one-parameter classes of formulas with $p=k=3,4,\mbox{and/or} 5$, $A(\infty)$-stability implies $A(0)$-stability.", 15441 acknowledgement = ack-nhfb, 15442 classcodes = "B0290B (Error analysis in numerical methods); B0290P (Differential equations); C4110 (Error analysis in numerical methods); C4170 (Differential equations)", 15443 classification = "921", 15444 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 15445 journalabr = "Commun ACM", 15446 keywords = "A(0)-stability; A(inf)-stability; accuracy; differential equations; error analysis; linear multistep formulas; mathematical techniques; numerical; numerical methods; order of accuracy; parametrised linear multistep formulae; parametrized linear multistep formulas; solution; stability; stiff equations; stiff ordinary differential equations; strict stability", 15447 treatment = "T Theoretical or Mathematical", 15448} 15449 15450@Article{Hanson:1975:SUM, 15451 author = "Richard J. Hanson", 15452 title = "Stably Updating Mean and Standard Deviation of Data", 15453 journal = j-CACM, 15454 volume = "18", 15455 number = "1", 15456 pages = "57--58", 15457 month = jan, 15458 year = "1975", 15459 CODEN = "CACMA2", 15460 ISSN = "0001-0782", 15461 MRclass = "62-04", 15462 MRnumber = "51 7064", 15463 mrreviewer = "D. J. Evans", 15464 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15465 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1975.bib", 15466 note = "Collection of articles honoring {Alston S. Householder}", 15467 abstract = "By considering the (sample) mean of a set of data as a fit to this data by a constant function, a computational method is given based on a matrix formulation and Givens transformations. The (sample) mean and standard deviation can be updated as data accumulates. The procedure is numerically stable and does not require storage of the data. Methods for dealing with weighted data and data removal are presented. When updating the mean and square of the standard deviation, the process requires no square roots.", 15468 acknowledgement = ack-nhfb, 15469 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation)", 15470 classification = "921", 15471 corpsource = "Washington State Univ., Pullman, WA, USA", 15472 country = "USA", 15473 descriptors = "Simulation; statistics; numeric calculation;", 15474 enum = "7357", 15475 journalabr = "Commun ACM", 15476 keywords = "data removal; estimation; function approximation; Givens; iterative methods; least squares approximation; mathematical statistics; mathematical techniques; matrix formulation; mean; stably updating; standard deviation; theory; transformations; weighted data", 15477 language = "English", 15478 references = "0", 15479 treatment = "T Theoretical or Mathematical", 15480} 15481 15482@Article{McCarthy:1975:PCC, 15483 author = "John McCarthy", 15484 title = "Proposed Criterion for a Cipher to be Probable-Word Proof", 15485 journal = j-CACM, 15486 volume = "18", 15487 number = "2", 15488 pages = "??--??", 15489 month = feb, 15490 year = "1975", 15491 CODEN = "CACMA2", 15492 ISSN = "0001-0782", 15493 bibdate = "Sat Jan 18 15:50:16 1997", 15494 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 15495 xxnote = "Cannot find in index to volume 18, nor in Compendex, nor in MathSciNet, nor in Zentralblatt f{\"u}r Mathematik, nor in ACM Computing Archive CD-ROM.", 15496} 15497 15498@Article{Burnett:1975:AIM, 15499 author = "G. J. Burnett and E. G. {Coffman, Jr.}", 15500 title = "Analysis of Interleaved Memory Systems Using Blockage Buffers", 15501 journal = j-CACM, 15502 volume = "18", 15503 number = "2", 15504 pages = "91--95", 15505 month = feb, 15506 year = "1975", 15507 CODEN = "CACMA2", 15508 ISSN = "0001-0782", 15509 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15510 bibsource = "Compendex database", 15511 abstract = "A model of interleaved memory systems is presented, and the analysis of the model by Monte Carlo simulation is discussed. The simulations investigate the performance of various system structures, i.e., schemes for sending instruction and data requests to the memory system. Performance is measured by determining the distribution of the number of memory modules in operation during a memory cycle.", 15512 acknowledgement = ack-nhfb, 15513 classcodes = "C5310 (Storage system design); C6120 (File organisation)", 15514 classification = "723", 15515 corpsource = "Index Systems Inc., Cambridge, MA, USA", 15516 journalabr = "Commun ACM", 15517 keywords = "blockage buffers; data requests; data storage, digital; file organisation; interleaved memory systems; memory cycle; memory modules; Monte Carlo methods; Monte Carlo simulation; simulation; storage; structures; system; units", 15518 treatment = "T Theoretical or Mathematical", 15519} 15520 15521@Article{Goldman:1975:SPC, 15522 author = "Neil M. Goldman", 15523 title = "Sentence Paraphrasing from a Conceptual Base", 15524 journal = j-CACM, 15525 volume = "18", 15526 number = "2", 15527 pages = "96--106", 15528 month = feb, 15529 year = "1975", 15530 CODEN = "CACMA2", 15531 ISSN = "0001-0782", 15532 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15533 bibsource = "Compendex database", 15534 abstract = "A model of natural language generation based on an underlying language-free representation of meaning is described. A program based on this model is able to produce sentence paraphrases which demonstrate understanding with respect to a given context. This generator operates in conjunction with a natural language analyzer and a combined memory and inference model. In generating sentences from meaning structures, the program employs both the information retrieval and deduction capabilities of the memory model.", 15535 acknowledgement = ack-nhfb, 15536 classcodes = "C1230 (Artificial intelligence); C7820 (Humanities computing)", 15537 classification = "721", 15538 corpsource = "Stanford Univ., Stanford, CA, USA", 15539 journalabr = "Commun ACM", 15540 keywords = "artificial intelligence; automata theory; conceptual base; conceptual properties; dictionary; discrimination nets; formal grammar; information retrieval; knowledge; language translation and; linguistics; memory and inference; model; natural language; sentence paraphrasing; surface grammatical; syntactic roles; systems science and cybernetics --- Artificial Intelligence; word sense", 15541 treatment = "X Experimental", 15542} 15543 15544@Article{VanderBrug:1975:SSP, 15545 author = "Gordon J. VanderBrug and Jack Minker", 15546 title = "State-Space, Problem-Reduction, and Theorem Proving --- Some Relationships", 15547 journal = j-CACM, 15548 volume = "18", 15549 number = "2", 15550 pages = "107--115", 15551 month = feb, 15552 year = "1975", 15553 CODEN = "CACMA2", 15554 ISSN = "0001-0782", 15555 MRclass = "68A45", 15556 MRnumber = "54 9192", 15557 mrreviewer = "Walter Oberschelp", 15558 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15559 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib", 15560 abstract = "This paper suggests a bidirectional relationship between state-space and problem-reduction representations. It presents a formalism based on multiple-input and multiple-output operators which provides a basis for viewing the two types of representations in this manner. A representation of the language recognition problem which is based on the J. Cocke parsing algorithm is used as an illustration. A method for representing problems in first-order logic in such a way that the inference system employed by a resolution-based theorem prover determines whether the set of clauses is interpreted in the state-space mode or in the problem-reduction mode is presented.", 15561 acknowledgement = ack-nhfb, 15562 classcodes = "C1230 (Artificial intelligence); C1310 (Control system analysis and synthesis methods)", 15563 classification = "461; 731", 15564 corpsource = "Univ. of Maryland, College Park, MD, USA", 15565 journalabr = "Commun ACM", 15566 keywords = "systems science and cybernetics", 15567 keywords = "artificial intelligence; Cocke parsing algorithm; first order logic; inference; input-resolution; language recognition problem; linear resolution; multiple input operators; multiple output; operators; problem reduction; proving; resolution based theorem prover; state space; state-space methods; system; theorem; theorem proving", 15568 treatment = "T Theoretical or Mathematical", 15569} 15570 15571@Article{Kimme:1975:FCA, 15572 author = "Carolyn Kimme and Dana Ballard and Jack Sklansky", 15573 title = "Finding Circles by an Array of Accumulators", 15574 journal = j-CACM, 15575 volume = "18", 15576 number = "2", 15577 pages = "120--122", 15578 month = feb, 15579 year = "1975", 15580 CODEN = "CACMA2", 15581 ISSN = "0001-0782", 15582 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15583 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/Reverse.eng.bib", 15584 abstract = "An efficient procedure for detecting approximate circles and approximately circular arcs of varying gray levels in an edge-enhanced digitized picture is described.", 15585 acknowledgement = ack-nhfb, 15586 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition); C5530 (Pattern recognition and computer vision equipment); C7330 (Biology and medical computing)", 15587 classification = "723; 741", 15588 corpsource = "Univ. of California, Irvine, CA, USA", 15589 journalabr = "Commun ACM", 15590 keywords = "approximate circles; array of accumulators; biomedical applications of computers; circle finding; circular arcs; curve detection; edge enhanced digitised; grey levels; Haugh straight line finder; line fitting; pattern recognition; pattern recognition systems; picture; picture processing", 15591 treatment = "T Theoretical or Mathematical", 15592} 15593 15594@Article{Johnston:1975:MRE, 15595 author = "H. C. Johnston and C. A. R. Hoare", 15596 title = "Matrix Reduction --- an Efficient Method (school timetables)", 15597 journal = j-CACM, 15598 volume = "18", 15599 number = "3", 15600 pages = "141--150", 15601 month = mar, 15602 year = "1975", 15603 CODEN = "CACMA2", 15604 ISSN = "0001-0782", 15605 MRclass = "65K05", 15606 MRnumber = "52 2203", 15607 mrreviewer = "P. Brock", 15608 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15609 bibsource = "Compendex database", 15610 abstract = "The paper describes an efficient method for reduction of the binary matrices which arise in some school time-tabling problems. It is a development of that described by John Lions. It has been generalized and adapted to fit into the complete timetabling process; to use a more compact data representation and more efficient processing techniques; to take fuller advantage of possible available previous knowledge about the matrix. And it is designed as a structured program, which can readily be coded by the reader in the high level or low level programming language of his choice. Practical tests of the method have shown it to be a good basis for a realistic timetabling algorithm.", 15611 acknowledgement = ack-nhfb, 15612 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C7110 (Educational administration)", 15613 classification = "921", 15614 corpsource = "Queen's Univ. of Belfast, UK", 15615 journalabr = "Commun ACM", 15616 keywords = "binary matrices; data representation; educational administrative data processing; high level programming language; low level programming language; mathematical techniques; matrix algebra; matrix reduction; problems; processing techniques; school time tabling; school timetable construction; structured program; structured programming; tight set; timetabling algorithm", 15617 treatment = "A Application; T Theoretical or Mathematical", 15618} 15619 15620@Article{Kernighan:1975:STM, 15621 author = "Brian W. Kernighan and Lorinda L. Cherry", 15622 title = "A System for Typesetting Mathematics", 15623 journal = j-CACM, 15624 volume = "18", 15625 number = "3", 15626 pages = "151--157", 15627 month = mar, 15628 year = "1975", 15629 CODEN = "CACMA2", 15630 ISSN = "0001-0782", 15631 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15632 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1975.bib", 15633 abstract = "This paper describes the design and implementation of a system for typesetting mathematics. \par The language has been designed to be easy to learn and to use by people (for example, secretaries and mathematical typists) who know neither mathematics nor typesetting. Experience indicates that the language can be learned in an hour or so, for it has few rules and fewer exceptions. For typical expressions, the size and font changes, positioning, line drawing, and the like necessary to print according to mathematical conventions are all done automatically. For example, the input {\tt sum from i=0 to infinity x sub i=pi over 2} produces $\sum_{i=0}^\infty x_i = \pi/2$. The syntax of the language is specified by a small context-free grammar; a compiler-compiler is used to make a compiler that translates this language into typesetting commands. Output maybe produced on either a phototypesetter or on a terminal with forward and reverse half-line motions. The system interfaces directly with text formatting programs, so mixtures of text and mathematics may be handled simply. This paper was typeset by the authors using the system described.", 15634 acknowledgement = ack-nhfb, 15635 classcodes = "C6130 (Data handling techniques); C6140D (High level languages); C7230 (Publishing and reproduction); C7310 (Mathematics computing)", 15636 classification = "723; 745", 15637 corpsource = "Bell Labs., Holmdel, NJ, USA", 15638 country = "USA", 15639 date = "15/05/84", 15640 descriptors = "Design; realization; command language; graphics language; text processing; graphics; interactive mode;", 15641 enum = "1645", 15642 journalabr = "Commun ACM", 15643 keywords = "compiler-compiler; computer controlled typesetting; computer graphics; computer programming languages; graphics; mathematics; oriented languages; photocomposition; phototypesetter; printing; problem; syntax; terminal; text formatting programs; text processing.; typesetting; typesetting mathematics", 15644 language = "English", 15645 references = "7", 15646 treatment = "A Application; P Practical", 15647} 15648 15649@Article{Lawrie:1975:GPL, 15650 author = "D. H. Lawrie and T. Layman and D. Baer and J. M. Randal", 15651 title = "{GLYPNIR} --- {A} programming language for {Illiac IV}", 15652 journal = j-CACM, 15653 volume = "18", 15654 number = "3", 15655 pages = "157--164", 15656 month = mar, 15657 year = "1975", 15658 CODEN = "CACMA2", 15659 ISSN = "0001-0782", 15660 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15661 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 15662 abstract = "GLYPNIR is one of the earliest existing languages designed for programming the Illiac IV computer. The syntax of the language is based on ALGOL 60, but has been extended to allow the programmer explicitly to specify the parallelism of his algorithm in terms of 64-word vectors. This paper describes the characteristics, goals, and philosophy of the language, and discusses some of the problems associated with parallel computer architectures.", 15663 acknowledgement = ack-nhfb, 15664 classcodes = "C5400 (Analogue and digital computers and systems); C6140B (Machine-oriented languages)", 15665 classification = "723", 15666 corpsource = "Univ. of Illinois, Urbana-Champaign, IL, USA", 15667 journalabr = "Commun ACM", 15668 keywords = "ALGOL 60; algorithm; computer programming languages; GLYPNIR; GLYPNIR programming; Illiac IV computer; language; machine oriented languages; parallel computer architectures; parallel processing; parallelism; programming language; syntax", 15669 treatment = "G General Review; P Practical", 15670} 15671 15672@Article{Floyd:1975:ETB, 15673 author = "Robert W. Floyd and Ronald L. Rivest", 15674 title = "Expected Time Bounds for Selection", 15675 journal = j-CACM, 15676 volume = "18", 15677 number = "3", 15678 pages = "165--172", 15679 month = mar, 15680 year = "1975", 15681 CODEN = "CACMA2", 15682 ISSN = "0001-0782", 15683 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15684 bibsource = "Compendex database", 15685 abstract = "A new selection algorithm is presented which is shown to be very efficient on the average, both theoretically and practically. The number of comparisons used to select the $i$-th smallest of $n$ numbers is $n + \min(i,n-i) + o(n)$. A lower bound within 9 percent of the above formula is also derived.", 15686 acknowledgement = ack-nhfb, 15687 classcodes = "C4240 (Programming and algorithm theory); C7310 (Mathematics computing)", 15688 classification = "723", 15689 corpsource = "Stanford Univ., Stanford, CA, USA", 15690 journalabr = "Commun ACM", 15691 keywords = "algorithm theory; bound; computational complexity; computer programming; mathematics; medians; quantiles; selection; selection algorithm; time bounds", 15692 treatment = "T Theoretical or Mathematical", 15693} 15694 15695@Article{Floyd:1975:AAA, 15696 author = "R. W. Floyd and R. L. Rivest", 15697 title = "{ACM} Algorithm 489: The Algorithm {SELECT} -- for Finding the $i$th Smallest of $n$ Elements", 15698 journal = j-CACM, 15699 volume = "18", 15700 number = "3", 15701 pages = "173--173", 15702 month = mar, 15703 year = "1975", 15704 CODEN = "CACMA2", 15705 ISSN = "0001-0782", 15706 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15707 note = "See also \cite{Brown:1976:RAS}.", 15708 acknowledgement = ack-nhfb, 15709 classcodes = "C7310 (Mathematics computing)", 15710 corpsource = "Computer Sci. Dept., Stanford Univ., Stanford, CA, USA", 15711 keywords = "algorithm SELECT; Hoare's algorithm FIND; mathematics; sampling; subroutines", 15712 treatment = "P Practical", 15713} 15714 15715@Article{Erisman:1975:CCE, 15716 author = "A. M. Erisman and W. F. Tinney", 15717 title = "On Computing Certain Elements of the Inverse of a Sparse Matrix", 15718 journal = j-CACM, 15719 volume = "18", 15720 number = "3", 15721 pages = "177--179", 15722 month = mar, 15723 year = "1975", 15724 CODEN = "CACMA2", 15725 ISSN = "0001-0782", 15726 MRclass = "65F05", 15727 MRnumber = "51 14540", 15728 mrreviewer = "L. Hageman", 15729 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15730 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 15731 abstract = "A recursive algorithm for computing the inverse of a matrix from the LU factors based on relationships in Takahashi, et al., is examined. The formulas for the algorithm are given; the dependency relationships are derived; the computational costs are developed; and some general comments on application and stability are made.", 15732 acknowledgement = ack-nhfb, 15733 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 15734 classification = "921", 15735 corpsource = "Boeing Computer Services, Seattle, WA, USA", 15736 journalabr = "Commun ACM", 15737 keywords = "application; computational costs; computing; covar; dependency relationships; elements of inverse; inverse; inverse matrix; mathematical techniques; matrix algebra; nla; recursive algorithm; sensitivities; sparse; sparse matrices; sparse matrix; stability; triangular factorization; tridiagonal matrix", 15738 treatment = "T Theoretical or Mathematical", 15739} 15740 15741@Article{Shampine:1975:DLS, 15742 author = "L. F. Shampine", 15743 title = "Discrete Least Squares Polynomial Fits", 15744 journal = j-CACM, 15745 volume = "18", 15746 number = "3", 15747 pages = "179--180", 15748 month = mar, 15749 year = "1975", 15750 CODEN = "CACMA2", 15751 ISSN = "0001-0782", 15752 MRclass = "65D10", 15753 MRnumber = "51 2247", 15754 mrreviewer = "S. F. McCormick", 15755 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15756 bibsource = "Compendex database", 15757 abstract = "The recurrence relation between orthogonal polynomials is widely used for discrete least squares data fitting. A variant of the classical algorithm which has better numerical properties is presented and the reason for its improved performance is explained.", 15758 acknowledgement = ack-nhfb, 15759 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation)", 15760 classification = "921", 15761 corpsource = "Sandia Labs., Albuquerque, NM, USA", 15762 journalabr = "Commun ACM", 15763 keywords = "algorithm; data fitting; least squares; least squares approximations; least squares polynomial fits; lud; mathematical techniques; orthogonal polynomials; polynomials; recurrence relation between orthogonal polynomials; residual; scale", 15764 treatment = "T Theoretical or Mathematical", 15765} 15766 15767@Article{vanderSluis:1975:CPE, 15768 author = "A. {van der Sluis}", 15769 title = "Corrigendum: {``Perturbations of eigenvalues of non-normal matrices''}", 15770 journal = j-CACM, 15771 volume = "18", 15772 number = "3", 15773 pages = "180", 15774 month = mar, 15775 year = "1975", 15776 CODEN = "CACMA2", 15777 ISSN = "0001-0782", 15778 MRclass = "65F15", 15779 MRnumber = "51 9457b", 15780 mrreviewer = "Jan Zitko", 15781 bibdate = "Tue May 28 16:24:24 1996", 15782 note = "See \cite{vanderSluis:1975:PEN}.", 15783 acknowledgement = ack-nhfb, 15784} 15785 15786@Article{Parnas:1975:SCS, 15787 author = "D. L. Parnas", 15788 title = "On a Solution to the Cigarette Smoker's Problem (Without Conditional Statements)", 15789 journal = j-CACM, 15790 volume = "18", 15791 number = "3", 15792 pages = "181--183", 15793 month = mar, 15794 year = "1975", 15795 CODEN = "CACMA2", 15796 ISSN = "0001-0782", 15797 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15798 bibsource = "Compendex database", 15799 abstract = "This report discusses a problem first introduced by Patil, who has claimed that the cigarette smoker's problem cannot be solved using the $P$ and $V$ operations introduced by Dijkstra unless conditional statements are used. An examination of Patil's proof shows that he has established this claim only under strong restrictions on the use of $P$ and $V$. These restrictions eliminate programming techniques used by Dijkstra and others since the first introduction of the semaphore concept. This paper contains a solution to the problem. It also discusses the need for the generalized operators suggested by Patil.", 15800 acknowledgement = ack-nhfb, 15801 classcodes = "C6150J (Operating systems)", 15802 classification = "723", 15803 corpsource = "Tech. Hochschule Darmstadt, Darmstadt, West Germany", 15804 journalabr = "Commun ACM", 15805 keywords = "cigarette smoker's problem; co-operating processes; computer operating systems; conditional statements; generalized; operating systems; operating systems (computers); operators; process synchronization primitives; programming techniques; semaphore concept; synchronisation", 15806 treatment = "T Theoretical or Mathematical", 15807} 15808 15809@Article{Chambers:1975:CNH, 15810 author = "Jack A. Chambers and Ray V. Poore", 15811 title = "Computer Networks in Higher Education: Socio-Economic-Political Factors", 15812 journal = j-CACM, 15813 volume = "18", 15814 number = "4", 15815 pages = "193--199", 15816 month = apr, 15817 year = "1975", 15818 CODEN = "CACMA2", 15819 ISSN = "0001-0782", 15820 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15821 bibsource = "Compendex database", 15822 abstract = "This study presents the results of a nationwide survey of computer networks in higher education conducted during 1971-73. Five major and 18 minor networks were identified. The five major networks included: the ARPA Net, the California State College network, the University of Iowa\slash Iowa State University network, the Michigan Educational Research Information Triad, Inc., and the Triangle Universities Computation Center network in North Carolina. In-depth studies were conducted of the latter two nets. Based on the experiences of these operating networks, a number of factors are identified for consideration in developing networks. Finally, recommendations are advanced regarding the development of networks in higher education in the future.", 15823 acknowledgement = ack-nhfb, 15824 classcodes = "C5400 (Analogue and digital computers and systems); C7110 (Educational administration); C7810C (Computer-aided instruction)", 15825 classification = "722; 723; 901", 15826 corpsource = "Univ. of South Florida, Tampa, FL, USA", 15827 journalabr = "Commun ACM", 15828 keywords = "administrative data processing; ARPA; California State; College network; computer aided instruction; computer networking; computer networks; computer systems, digital --- Time Sharing; data processing; educational; higher education; Michigan Education Research Information Triad Inc; nationwide survey; net; network; social economic and political factors; Triangle; Universities Computation Centre network; University of Iowa/Iowa State University", 15829 treatment = "E Economic", 15830} 15831 15832@Article{Ginsberg:1975:AAD, 15833 author = "E. S. Ginsberg and D. Zaborowski", 15834 title = "{ACM} Algorithm 490: The Dilogarithm Function of a Real Argument", 15835 journal = j-CACM, 15836 volume = "18", 15837 number = "4", 15838 pages = "200--202", 15839 month = apr, 15840 year = "1975", 15841 CODEN = "CACMA2", 15842 ISSN = "0001-0782", 15843 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15844 note = "See also \cite{Morris:1976:RDF}.", 15845 acknowledgement = ack-nhfb, 15846 classcodes = "B0290D (Functional analysis); C4120 (Functional analysis); C7310 (Mathematics computing)", 15847 corpsource = "Dept. of Phys., Univ. of Massachusetts, Boston, MA, USA", 15848 keywords = "dilogarithm function; electrodynamics; ferromagnets; function evaluation; function subroutine; ideal; library; network analysis; polymers; quantum; real argument; subprograms; subroutines; thermodynamics", 15849 treatment = "A Application; T Theoretical or Mathematical", 15850} 15851 15852@Article{Shen:1975:CWB, 15853 author = "K. K. Shen and J. L. Peterson", 15854 title = "Corrigendum: ``{A Weighted Buddy Method for Dynamic Storage Allocation}''", 15855 journal = j-CACM, 15856 volume = "18", 15857 number = "4", 15858 pages = "202--202", 15859 month = apr, 15860 year = "1975", 15861 CODEN = "CACMA2", 15862 ISSN = "0001-0782", 15863 bibdate = "Sat Jan 18 15:14:25 1997", 15864 note = "See \cite{Shen:1974:WBM}.", 15865} 15866 15867@Article{Smith:1975:MOL, 15868 author = "Graham Smith", 15869 title = "On Maintenance of the Opportunity List for Class-Teacher Timetable Problems", 15870 journal = j-CACM, 15871 volume = "18", 15872 number = "4", 15873 pages = "203--208", 15874 month = apr, 15875 year = "1975", 15876 CODEN = "CACMA2", 15877 ISSN = "0001-0782", 15878 MRclass = "90B35", 15879 MRnumber = "51 12314", 15880 mrreviewer = "I. Gh. Ciobanu", 15881 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15882 bibsource = "Compendex database", 15883 abstract = "One of the principal components of procedures for the solution of class-teacher timetable problems is that for maintenance of the opportunity list. Opportunity list maintenance methods are based on necessary conditions for the existence of a solution. A general framework for necessary conditions, together with four specific sets of necessary conditions, is given.", 15884 acknowledgement = ack-nhfb, 15885 classcodes = "C7110 (Educational administration)", 15886 classification = "723; 901", 15887 corpsource = "Univ. of New South Wales, Kensington, NSW, Australia", 15888 journalabr = "Commun ACM", 15889 keywords = "class teacher; combinatorial; data processing; educational administrative data processing; necessary conditions; opportunity list; schedule; scheduling; school timetable; timetable; timetable problems", 15890 treatment = "A Application; T Theoretical or Mathematical", 15891} 15892 15893@Article{Braid:1975:SSB, 15894 author = "I. C. Braid", 15895 title = "The Synthesis of Solids Bounded by Many Faces", 15896 journal = j-CACM, 15897 volume = "18", 15898 number = "4", 15899 pages = "209--216", 15900 month = apr, 15901 year = "1975", 15902 CODEN = "CACMA2", 15903 ISSN = "0001-0782", 15904 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15905 bibsource = "Compendex database", 15906 abstract = "A technique is presented which allows a class of solid objects to be synthesized and stored using a computer. Synthesis begins with primitive solids like a cube, wedge, or cylinder. Any solid can be moved, scaled, or rotated. Solids may also be added together or subtracted. Two algorithms to perform addition are described. For practical designers, the technique has the advantage that operations are concise, readily composed, and are given in terms of easily imagined solids. Quite short sequences of operations suffice to build up complex solids bounded by many faces.", 15907 acknowledgement = ack-nhfb, 15908 classcodes = "C5540 (Terminals and graphic displays); C6130 (Data handling techniques); C7440 (Civil and mechanical engineering computing)", 15909 classification = "723", 15910 corpsource = "Univ. of Cambridge, Cambridge, UK", 15911 journalabr = "Commun ACM", 15912 keywords = "algorithms; computer graphics; computer-aided design; image processing; many faced solids; simulation; synthesis", 15913 treatment = "A Application; T Theoretical or Mathematical", 15914} 15915 15916@Article{Batagelj:1975:QHM, 15917 author = "Vladimir Batagelj", 15918 title = "Quadratic Hash Method When the Table Size is not a Prime Number", 15919 journal = j-CACM, 15920 volume = "18", 15921 number = "4", 15922 pages = "216--217", 15923 month = apr, 15924 year = "1975", 15925 CODEN = "CACMA2", 15926 ISSN = "0001-0782", 15927 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15928 bibsource = "Compendex database", 15929 abstract = "Previous work on quadratic hash methods is limited mainly to the case where the table size is a prime number. Here, certain results are derived for composite numbers. It is shown that all composite numbers containing at least the square of one of the component primes have full-period integer-coefficient quadratic hash functions.", 15930 acknowledgement = ack-nhfb, 15931 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques); C6130 (Data handling techniques)", 15932 classification = "723", 15933 corpsource = "Jozef Stefan Inst., Univ. of Ljubljana, Ljubljana, Yugoslavia", 15934 journalabr = "Commun ACM", 15935 keywords = "component primes; composite; computer programming; full period integer coefficient; numbers; prime number; quadratic hash functions; quadratic hash method; quadratic programming; table lookup; table size", 15936 treatment = "T Theoretical or Mathematical", 15937} 15938 15939@Article{Warren:1975:MWA, 15940 author = "Henry S. {Warren, Jr.}", 15941 title = "A Modification of {Warshall}'s Algorithm for the Transitive Closure of Binary Relations", 15942 journal = j-CACM, 15943 volume = "18", 15944 number = "4", 15945 pages = "218--220", 15946 month = apr, 15947 year = "1975", 15948 CODEN = "CACMA2", 15949 ISSN = "0001-0782", 15950 MRclass = "68A10", 15951 MRnumber = "51 2340", 15952 mrreviewer = "E. M. Reingold", 15953 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15954 bibsource = "Compendex database", 15955 abstract = "An algorithm is given for computing the transitive closure of a binary relation that is represented by a Boolean matrix. The algorithm is similar to Warshall's although it executes faster for sparse matrices on most computers, particularly in a paging environment.", 15956 acknowledgement = ack-nhfb, 15957 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra); C4210 (Formal logic)", 15958 classification = "723", 15959 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 15960 journalabr = "Commun ACM", 15961 keywords = "binary relation; binary relations; Boolean algebra; Boolean matrix; computer programming; digraph; directed graph; matrix algebra; paging environment; reachability matrix; sparse matrices; transitive closure; Warshall's algorithm", 15962 treatment = "T Theoretical or Mathematical", 15963} 15964 15965@Article{Hinds:1975:ALA, 15966 author = "James A. Hinds", 15967 title = "Algorithm for Locating Adjacent Storage Blocks in the Buddy System", 15968 journal = j-CACM, 15969 volume = "18", 15970 number = "4", 15971 pages = "221--222", 15972 month = apr, 15973 year = "1975", 15974 CODEN = "CACMA2", 15975 ISSN = "0001-0782", 15976 bibdate = "Tue Mar 25 13:26:09 MST 1997", 15977 bibsource = "Compendex database", 15978 abstract = "A simple scheme for the determination of the location of a block of storage relative to other blocks is described. This scheme is applicable to the buddy type storage allocation systems.", 15979 acknowledgement = ack-nhfb, 15980 classcodes = "C6120 (File organisation)", 15981 classification = "723", 15982 corpsource = "State Univ. of New York, Buffalo, NY, USA", 15983 journalabr = "Commun ACM", 15984 keywords = "algorithm; buddy system; computer programming; locating adjacent storage blocks; storage allocation; storage allocation systems", 15985 treatment = "P Practical", 15986} 15987 15988@Article{Vaucher:1975:CSE, 15989 author = "Jean G. Vaucher and Pierre Duval", 15990 title = "A Comparison of Simulation Event List Algorithms", 15991 journal = j-CACM, 15992 volume = "18", 15993 number = "4", 15994 pages = "223--230", 15995 month = apr, 15996 year = "1975", 15997 CODEN = "CACMA2", 15998 ISSN = "0001-0782", 15999 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16000 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1975.bib", 16001 note = "See corrigendum \cite{Vaucher:1975:CCS}.", 16002 abstract = "Four algorithms are considered which can be used to schedule events in a general purpose discrete simulation system. Two of the algorithms are new, one is based on an end-order tree structure for event notices, and another uses an indexed linear list. The algorithms are tested with a set of typical stochastic scheduling distributions especially chosen to show the advantages and limitations of the algorithms. \par The end-order tree algorithm is shown to be an advantageous, immediate replacement for the algorithm in use with current simulation languages. The most promising algorithm uses the indexed list concept. \par It will require an adaptive routine before it can be employed in general purpose simulators,but its performance is such that further study would be fruitful.", 16003 acknowledgement = ack-nhfb, 16004 classcodes = "C6130 (Data handling techniques); C7800 (Other computer applications)", 16005 classification = "723", 16006 corpsource = "Univ. de Montreal, Que., Canada", 16007 country = "USA", 16008 descriptors = "Simulation; event list control; time control;", 16009 enum = "3193", 16010 journalabr = "Commun ACM", 16011 keywords = "adaptive routine; computer programming; current simulation; discrete system simulation; end order tree structure; event list algorithm; event scheduling routine; indexed linear list; languages; scheduling; simulation; simulation event list algorithms; simulation executive; sorting; stochastic scheduling distributions; time flow mechanisms", 16012 language = "English", 16013 references = "0", 16014 treatment = "T Theoretical or Mathematical", 16015} 16016 16017@Article{Korfhage:1975:SO, 16018 author = "Robert R. Korfhage and David W. Matula", 16019 title = "On {Salazar} and {Oakford}", 16020 journal = j-CACM, 16021 volume = "18", 16022 number = "4", 16023 pages = "240--240", 16024 month = apr, 16025 year = "1975", 16026 CODEN = "CACMA2", 16027 ISSN = "0001-0782", 16028 bibdate = "Sat Jan 18 15:08:07 1997", 16029 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib", 16030 note = "See \cite{Salazar:1974:GFS,Korfhage:1975:MSO,Garey:1975:SO}", 16031 keywords = "graph coloring", 16032} 16033 16034@Article{Garey:1975:SO, 16035 author = "Michael R. Garey and David S. Johnson", 16036 title = "On {Salazar} and {Oakford}", 16037 journal = j-CACM, 16038 volume = "18", 16039 number = "4", 16040 pages = "240--241", 16041 month = apr, 16042 year = "1975", 16043 CODEN = "CACMA2", 16044 ISSN = "0001-0782", 16045 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib", 16046 note = "See \cite{Salazar:1974:GFS,Korfhage:1975:SO,Korfhage:1975:MSO}", 16047 keywords = "graph coloring", 16048} 16049 16050@Article{Fisher:1975:CCL, 16051 author = "David A. Fisher", 16052 title = "Copying Cyclic List Structures in Linear Time Using Bounded Workspace", 16053 journal = j-CACM, 16054 volume = "18", 16055 number = "5", 16056 pages = "251--252", 16057 month = may, 16058 year = "1975", 16059 CODEN = "CACMA2", 16060 ISSN = "0001-0782", 16061 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16062 bibsource = "Compendex database", 16063 abstract = "A bounded workspace copying algorithm for arbitrary list structures is given. This algorithm operates in linear time and does not require tag bits. The best previous bounded workspace copying algorithms achieved n**2 time without tag bits and n log n time with one tag. The only restriction on the algorithm given here is that the copy must be placed into a contiguous section of memory. The method is applicable to fixed or variable size nodes.", 16064 acknowledgement = ack-nhfb, 16065 classcodes = "C6130 (Data handling techniques)", 16066 classification = "723", 16067 corpsource = "Inst. for Defense Analyses, Arlington, VA, USA", 16068 journalabr = "Commun ACM", 16069 keywords = "bounded workspace; computer programming; computer programming languages --- List Processing; copying algorithm; cyclic list structures; linear time; list processing; nodes; tag bits", 16070 treatment = "P Practical", 16071} 16072 16073@Article{Cardenas:1975:API, 16074 author = "Alfonso F. Cardenas", 16075 title = "Analysis and Performance of Inverted Data Base Structures", 16076 journal = j-CACM, 16077 volume = "18", 16078 number = "5", 16079 pages = "253--263", 16080 month = may, 16081 year = "1975", 16082 CODEN = "CACMA2", 16083 ISSN = "0001-0782", 16084 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16085 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 16086 abstract = "The need to envision and architecture data base systems in a hierarchical level by level framework is stressed. The inverted data base (file) organization is then analyzed, considering implementation oriented aspects. The inverted directory is viewed realistically as another large data base which itself is subjected to inversion. Formulations are derived to estimate average access time (read only) and storage requirements, formalizing the interaction of data base content characteristics, logical complexity of queries, and machine timing and blocking specifications identified as having a first-order effect on performance. The formulations presented are necessary to be used in conjunction with any index selection criteria to determine the optimum set of index keys.", 16087 acknowledgement = ack-nhfb, 16088 classcodes = "C6120 (File organisation); C7100 (Business and administration); C7250 (Information storage and retrieval)", 16089 classification = "723", 16090 corpsource = "IBM Res. Lab., San Jose, CA, USA", 16091 journalabr = "Commun ACM", 16092 keywords = "access; data processing; data structures; file organisation; index keys; index selection criteria; indexing; indices; information retrieval; information retrieval systems; information storage; inverted data base structures; inverted directory; machine timing; management information systems; time", 16093 treatment = "P Practical", 16094} 16095 16096@Article{Wilks:1975:IAU, 16097 author = "Yorick Wilks", 16098 title = "An intelligent analyzer and understander of {English}", 16099 journal = j-CACM, 16100 volume = "18", 16101 number = "5", 16102 pages = "264--274", 16103 month = may, 16104 year = "1975", 16105 CODEN = "CACMA2", 16106 ISSN = "0001-0782", 16107 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16108 bibsource = "Compendex database", 16109 abstract = "The paper describes a working analysis and generation program for natural language, which handles paragraph length input. Its core is a system of preferential choice between deep semantic patterns, based on what we call ``semantic density.'' The system is contrasted: (1) with syntax oriented linguistic approaches, and (2) with theorem proving approaches to the understanding problem.", 16110 acknowledgement = ack-nhfb, 16111 classcodes = "C1230 (Artificial intelligence); C4290 (Other computer theory); C7820 (Humanities computing)", 16112 classification = "721; 731", 16113 corpsource = "Stanford Univ., Stanford, CA, USA", 16114 journalabr = "Commun ACM", 16115 keywords = "artificial intelligence; automata theory --- Computational Linguistics; computational linguistics; deep semantic patterns; generation program; intelligent analyzer; language; natural language; paragraph length; semantic density; syntax oriented linguistic approaches; systems science and cybernetics; translation and linguistics", 16116 treatment = "P Practical", 16117} 16118 16119@Article{Gibbs:1975:AAB, 16120 author = "N. E. Gibbs", 16121 title = "{ACM} Algorithm 491: Basic Cycle Generation", 16122 journal = j-CACM, 16123 volume = "18", 16124 number = "5", 16125 pages = "275--276 (or 275--275??)", 16126 month = may, 16127 year = "1975", 16128 CODEN = "CACMA2", 16129 ISSN = "0001-0782", 16130 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16131 acknowledgement = ack-nhfb, 16132 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics); C7310 (Mathematics computing)", 16133 corpsource = "Dept. of Math., Coll. of William and Mary, Williamsburg, VA, USA", 16134 keywords = "basic; BASIC GENERATOR; cycle generation; finite undirected graph; graph theory; Paton's algorithm; PL/I; subroutines; vertex adjacency matrix", 16135 treatment = "T Theoretical or Mathematical", 16136} 16137 16138@Article{Evans:1975:NLF, 16139 author = "D. J. Evans and M. Hatzopoulos", 16140 title = "A note on the {LU} factorization of a symmetric matrix", 16141 journal = j-CACM, 16142 volume = "18", 16143 number = "5", 16144 pages = "278--279", 16145 month = may, 16146 year = "1975", 16147 CODEN = "CACMA2", 16148 ISSN = "0001-0782", 16149 MRclass = "15A21 (65F30)", 16150 MRnumber = "52 8154", 16151 mrreviewer = "Marvin Marcus", 16152 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16153 acknowledgement = ack-nhfb, 16154 classcodes = "B0290H (Linear algebra); C4140 (Linear algebra)", 16155 corpsource = "Univ. of Technol., Loughborough, UK", 16156 keywords = "factorization; matrix inversion; separable systems; symmetric matrices; test matrices", 16157 keywords = "inversion programs; linear equations; LU factorisation; matrix; matrix algebra; symmetric matrix; test matrices", 16158 treatment = "T Theoretical or Mathematical", 16159} 16160 16161@Article{Fox:1975:MKS, 16162 author = "B. L. Fox", 16163 title = "More on $k$th Shortest Paths", 16164 journal = j-CACM, 16165 volume = "18", 16166 number = "5", 16167 pages = "279--279", 16168 month = may, 16169 year = "1975", 16170 CODEN = "CACMA2", 16171 ISSN = "0001-0782", 16172 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16173 acknowledgement = ack-nhfb, 16174 classcodes = "B0250 (Combinatorial mathematics); B0260 (Optimisation techniques); C1160 (Combinatorial mathematics); C1180 (Optimisation techniques)", 16175 corpsource = "Univ. of Montreal, Montreal, Que., Canada", 16176 keywords = "graph theory; kth shortest paths; N node network; networks; nodes; optimisation", 16177 treatment = "G General Review", 16178 xxauthor = "B. I. Fox", 16179} 16180 16181@Article{Wasserman:1975:PPP, 16182 author = "A. I. Wasserman", 16183 title = "A problem-list of public policy issues concerning computers and health care", 16184 journal = j-CACM, 16185 volume = "18", 16186 number = "5", 16187 pages = "279--280", 16188 month = may, 16189 year = "1975", 16190 CODEN = "CACMA2", 16191 ISSN = "0001-0782", 16192 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16193 acknowledgement = ack-nhfb, 16194 classcodes = "C0200 (General computer topics); C7190 (Other fields of business and administrative computing); C7330 (Biology and medical computing)", 16195 corpsource = "Univ. of California, San Francisco, CA, USA", 16196 keywords = "biomedical applications of computers; computers and health care; economic and; medicine; public policy issues; sociological effects", 16197 treatment = "A Application; E Economic; G General Review", 16198} 16199 16200@Article{Mills:1975:CNM, 16201 author = "Harlan D. Mills", 16202 title = "Corrigendum: {``The New Math of Computer Programming''}", 16203 journal = j-CACM, 16204 volume = "18", 16205 number = "5", 16206 pages = "280--280", 16207 month = may, 16208 year = "1975", 16209 CODEN = "CACMA2", 16210 ISSN = "0001-0782", 16211 MRclass = "68A05", 16212 MRnumber = "51 2333b", 16213 mrreviewer = "E. Ikaunieks", 16214 bibdate = "Tue May 28 16:26:36 1996", 16215 note = "See \cite{Mills:1975:NMC}.", 16216 acknowledgement = ack-nhfb, 16217} 16218 16219@Article{Horowitz:1975:SAP, 16220 author = "Steven L. Horowitz", 16221 title = "Syntactic Algorithm for Peak Detection in Waveforms with Applications to Cardiography", 16222 journal = j-CACM, 16223 volume = "18", 16224 number = "5", 16225 pages = "281--285", 16226 month = may, 16227 year = "1975", 16228 CODEN = "CACMA2", 16229 ISSN = "0001-0782", 16230 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16231 bibsource = "Compendex database", 16232 abstract = "Peaks in a digitized waveform are detected by an algorithm incorporating piecewise linear approximation and tabular parsing techniques. Several parameters serve to identify the waveform context enabling accurate measurement of peak amplitude, duration, and shape. The algorithm is of sufficient speed to allow on-line real-time processing. An example of its application is demonstrated on an electrocardiogram.", 16233 acknowledgement = ack-nhfb, 16234 classcodes = "A8770E (Patient diagnostic methods and instrumentation); B0290F (Interpolation and function approximation); B7510D (Bioelectric signals); C4130 (Interpolation and function approximation); C4210 (Formal logic); C7330 (Biology and medical computing)", 16235 classification = "723", 16236 corpsource = "Princeton Univ., Princeton, NJ, USA", 16237 journalabr = "Commun ACM", 16238 keywords = "amplitude; applications; biomedical engineering --- Electrocardiography; context-free grammars; duration; electrocardiogram; electrocardiography; parsing techniques; pattern recognition systems; peak detection; piecewise linear approximation; piecewise-linear; shape; syntactic algorithm; tabular; techniques; to cardiography; waveform analysis; waveforms", 16239 treatment = "A Application", 16240} 16241 16242@Article{Pfefferkorn:1975:HPS, 16243 author = "Charles E. Pfefferkorn", 16244 title = "Heuristic Problem Solving Design System for Equipment or Furniture Layouts", 16245 journal = j-CACM, 16246 volume = "18", 16247 number = "5", 16248 pages = "286--297", 16249 month = may, 16250 year = "1975", 16251 CODEN = "CACMA2", 16252 ISSN = "0001-0782", 16253 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16254 bibsource = "Compendex database", 16255 abstract = "The Designer Problem Solver (DPS) demonstrates that the computer can perform simple design tasks. In particular, it designs furniture and equipment layouts. This task was chosen because it is simple, well defined, and characteristic of many design tasks in architecture, engineering, urban planning, and natural resource management. These space planning tasks usually involve manipulating two-dimensional representations of objects to create feasible or optimal solutions for problems involving topological and metric spatial constraints. The paper describes extensive tests performed on the program.", 16256 acknowledgement = ack-nhfb, 16257 classcodes = "C1230 (Artificial intelligence); C7800 (Other computer applications)", 16258 classification = "731; 901", 16259 corpsource = "Evans and Sutherland Computer Corp., Sunnyvale, CA, USA", 16260 journalabr = "Commun ACM", 16261 keywords = "architecture; computer graphics; computer-aided design; design; engineering; equipment layout; furniture layouts; heuristic; heuristic problem solving design system; management; metric; natural resource; optimal solutions; problem solver; program; programming; space planning tasks; spatial constraints; systems science and cybernetics --- Heuristic Programming; urban planning", 16262 treatment = "A Application; P Practical", 16263} 16264 16265@Article{Korfhage:1975:MSO, 16266 author = "Robert R. Korfhage and David W. Matula", 16267 title = "More on the {Salazar} and {Oakford} Paper", 16268 journal = j-CACM, 16269 volume = "18", 16270 number = "5", 16271 pages = "303--303", 16272 month = may, 16273 year = "1975", 16274 CODEN = "CACMA2", 16275 ISSN = "0001-0782", 16276 bibdate = "Sat Jan 18 15:08:07 1997", 16277 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib", 16278 note = "See \cite{Salazar:1974:GFS,Korfhage:1975:SO,Garey:1975:SO}", 16279 keywords = "graph coloring", 16280} 16281 16282@Article{Gibbs:1975:AAG, 16283 author = "N. E. Gibbs", 16284 title = "{ACM} Algorithm 492: Generation of All the Cycles of a Graph from a Set of Basic Cycles", 16285 journal = j-CACM, 16286 volume = "18", 16287 number = "6", 16288 pages = "310--310", 16289 month = jun, 16290 year = "1975", 16291 CODEN = "CACMA2", 16292 ISSN = "0001-0782", 16293 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16294 acknowledgement = ack-nhfb, 16295 classcodes = "C7310 (Mathematics computing)", 16296 corpsource = "Dept. of Math., Coll. of William and Mary, Williamsburg, VA, USA", 16297 keywords = "basic cycles; cycles; generation; graph; graph theory; PL/I; subroutines", 16298 treatment = "A Application; T Theoretical or Mathematical", 16299} 16300 16301@Article{Phong:1975:ICG, 16302 author = "Bui Tuong Phong", 16303 title = "Illumination for Computer Generated Pictures", 16304 journal = j-CACM, 16305 volume = "18", 16306 number = "6", 16307 pages = "311--317", 16308 month = jun, 16309 year = "1975", 16310 CODEN = "CACMA2", 16311 ISSN = "0001-0782", 16312 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16313 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.75.bib", 16314 abstract = "The quality of computer generated images of three-dimensional scenes depends on the shading technique used to paint the objects on the cathode-ray tube screen. The shading algorithm itself depends in part on the method for modeling the object, which also determines the hidden surface algorithm. The various methods of object modeling, shading, and hidden surface removal are thus strongly interconnected. Several shading techniques corresponding to different methods of object modeling and the related hidden surface algorithms are presented here. Human visual perception and the fundamental laws of optics are considered in the development of a shading rule that provides better quality and increased realism in generated images.", 16315 acknowledgement = ack-nhfb, 16316 classcodes = "C5540 (Terminals and graphic displays)", 16317 classification = "723; 741", 16318 corpsource = "Univ. of Utah, Salt Lake City, UT, USA", 16319 journalabr = "Commun ACM", 16320 keywords = "computer generated images; computer graphics; hidden surface algorithm; image processing; Phong; shading; shading algorithm; technique; three dimensional scenes", 16321 treatment = "P Practical", 16322} 16323 16324@Article{Lum:1975:COA, 16325 author = "V. Y. Lum and M. E. Senko and C. P. Wang and H. Ling", 16326 title = "A Cost Oriented Algorithm for Data Set Allocation in Storage Hierarchies", 16327 journal = j-CACM, 16328 volume = "18", 16329 number = "6", 16330 pages = "318--322", 16331 month = jun, 16332 year = "1975", 16333 CODEN = "CACMA2", 16334 ISSN = "0001-0782", 16335 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16336 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 16337 abstract = "The trend in computer systems is toward the use of multilevel storage hierarchy systems. In this kind of system, data set allocation is usually based on qualitative, ad hoc decisions. If automatic data migration is used at all, the data sets are allocated to slower level memories simply on the basis of an ad hoc threshold against a time interval since the last use. To achieve quantitative, more optimal allocation, both storage cost and access time cost must be carefully analyzed. This paper presents an appropriate automatic algorithm which includes many significant details of both costs.", 16338 acknowledgement = ack-nhfb, 16339 classcodes = "C6120 (File organisation)", 16340 classification = "723", 16341 corpsource = "IBM Res. Lab., San Jose, CA, USA", 16342 journalabr = "Commun ACM", 16343 keywords = "algorithm; computer operating systems; cost oriented; data migration; data set allocation; data staging; data storage; hierarchies; storage; storage allocation", 16344 treatment = "P Practical", 16345} 16346 16347@Article{Babich:1975:SES, 16348 author = "Alan F. Babich and John Grason and David L. Parnas", 16349 title = "Significant Event Simulation", 16350 journal = j-CACM, 16351 volume = "18", 16352 number = "6", 16353 pages = "323--329", 16354 month = jun, 16355 year = "1975", 16356 CODEN = "CACMA2", 16357 ISSN = "0001-0782", 16358 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16359 bibsource = "Compendex database", 16360 abstract = "This paper compares a new method of simulation organization, called the significant event method, with an old one, called the clock pulse method, using as examples two automobile traffic models. The significant event method is found to be more efficient than the clock pulse method at low levels of system interaction and less efficient at high levels. A simple mathematical model for the trade-off in the relative running time of the two methods is developed. The model aids in choosing between the two simulation methods for a particular experiment. It is concluded that the significant event method can be of value in the simulation of some systems when computational efficiency is of sufficient importance.", 16361 acknowledgement = ack-nhfb, 16362 classcodes = "C6110 (Systems analysis and programming); C7800 (Other computer applications)", 16363 classification = "723", 16364 corpsource = "Carnegie-Mellon Univ., Pittsburg, PA, USA", 16365 journalabr = "Commun ACM", 16366 keywords = "clock pulse models; computational efficiency; computer simulation; efficient; significant event method; simulation", 16367 treatment = "P Practical", 16368} 16369 16370@Article{Dewar:1975:ITC, 16371 author = "Robert B. K. Dewar", 16372 title = "Indirect Threaded Code", 16373 journal = j-CACM, 16374 volume = "18", 16375 number = "6", 16376 pages = "330--331", 16377 month = jun, 16378 year = "1975", 16379 CODEN = "CACMA2", 16380 ISSN = "0001-0782", 16381 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16382 bibsource = "Compendex database", 16383 abstract = "An efficient arrangement for interpretive code is described. It is related to Bell's notion of threaded code but requires less space and is more amenable to machine independent implementations.", 16384 acknowledgement = ack-nhfb, 16385 classcodes = "C6110 (Systems analysis and programming); C6150C (Compilers, interpreters and other processors)", 16386 classification = "723", 16387 corpsource = "Illinois Inst. of Technol., Chicago, IL, USA", 16388 journalabr = "Commun ACM", 16389 keywords = "code generation; codes, symbolic; implementations; indirect threaded code; interpretive code; interpretors; machine independent; program interpreters; programming; SNOBOL; SNOBOL4; SPITBOL; threaded code", 16390 treatment = "P Practical", 16391} 16392 16393@Article{Cranston:1975:SRS, 16394 author = "Ben Cranston and Rick Thomas", 16395 title = "Simplified Recombination Scheme for the {Fibonacci} Buddy System", 16396 journal = j-CACM, 16397 volume = "18", 16398 number = "6", 16399 pages = "331--332", 16400 month = jun, 16401 year = "1975", 16402 CODEN = "CACMA2", 16403 ISSN = "0001-0782", 16404 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16405 bibsource = "Compendex database", 16406 abstract = "A simplified recombination scheme for the Fibonacci buddy system which requires neither tables nor repetitive calculations and uses only two additional bits per buffer is presented.", 16407 acknowledgement = ack-nhfb, 16408 classcodes = "C6120 (File organisation)", 16409 classification = "723", 16410 corpsource = "Univ. of Maryland, College Park, MD, USA", 16411 journalabr = "Commun ACM", 16412 keywords = "computer operating systems; dynamic storage allocation; Fibonacci buddy system; simplified recombination scheme; storage allocation", 16413 treatment = "P Practical", 16414} 16415 16416@Article{Aho:1975:ESM, 16417 author = "Alfred V. Aho and Margaret J. Corasick", 16418 title = "Efficient String Matching: an Aid to Bibliographic Search", 16419 journal = j-CACM, 16420 volume = "18", 16421 number = "6", 16422 pages = "333--340", 16423 month = jun, 16424 year = "1975", 16425 CODEN = "CACMA2", 16426 ISSN = "0001-0782", 16427 MRclass = "68A50", 16428 MRnumber = "51 7393", 16429 mrreviewer = "K. H. V. Booth", 16430 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16431 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 16432 abstract = "This paper describes a simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text. The algorithm consists of constructing a finite state pattern matching machine from the keywords and then using the pattern matching machine to process the text string in a single pass. Construction of the pattern matching machine takes time proportional to the sum of the lengths of the keywords. The number of state transitions made by the pattern matching machine in processing the text string is independent of the number of keywords. The algorithm has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.", 16433 acknowledgement = ack-nhfb, 16434 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 16435 classification = "721; 723", 16436 corpsource = "Bell Labs., Murray Hill, NJ, USA", 16437 journalabr = "Commun ACM", 16438 keywords = "algorithm; automata theory --- Finite Automata; bibliographic search; computational complexity.; efficient; finite state machines; finite state pattern matching; information retrieval; information retrieval systems; keywords; keywords and phrases; patterns UNIX searching; string matching; string pattern matching; text; text editing; text-editing", 16439 treatment = "P Practical", 16440} 16441 16442@Article{Hirschberg:1975:LSA, 16443 author = "D. S. Hirschberg", 16444 title = "A Linear Space Algorithm for Computing Maximal Common Subsequences", 16445 journal = j-CACM, 16446 volume = "18", 16447 number = "6", 16448 pages = "341--343", 16449 month = jun, 16450 year = "1975", 16451 CODEN = "CACMA2", 16452 ISSN = "0001-0782", 16453 MRclass = "68A10 (68A20)", 16454 MRnumber = "51 12019", 16455 mrreviewer = "Claude Benzaken", 16456 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16457 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib", 16458 abstract = "The problem of finding a longest common subsequence of two strings has been solved in quadratic time and space. An algorithm is presented which will solve this problem in quadratic time and in linear space.", 16459 acknowledgement = ack-nhfb, 16460 classcodes = "C6130 (Data handling techniques)", 16461 classification = "723", 16462 comment = "Algorithms are given that solve the longest common subsequence problem in quadratic time and linear space. Previously algorithms for this problem used quadratic time and quadratic space.", 16463 corpsource = "Princeton Univ., Princeton, NY, USA", 16464 journalabr = "Commun ACM", 16465 keywords = "computer programming; computing; data handling; editing; linear space; linear space algorithm; longest common subsequence; maximal common; quadratic time; string correction; subsequence; subsequences; two strings", 16466 treatment = "A Application; T Theoretical or Mathematical", 16467} 16468 16469@Article{Soule:1975:AAB, 16470 author = "Stephen Soule", 16471 title = "Addition in an Arbitrary Base Without Radix Conversion", 16472 journal = j-CACM, 16473 volume = "18", 16474 number = "6", 16475 pages = "344--346", 16476 month = jun, 16477 year = "1975", 16478 CODEN = "CACMA2", 16479 ISSN = "0001-0782", 16480 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16481 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/Seiferas/1975.bib", 16482 abstract = "This paper presents a generalization of an old programming technique; using it, one may add and subtract numbers represented in any radix, including a mixed radix, and stored one digit per byte in bytes of sufficient size. Radix conversion is unnecessary, no looping is required, and numbers may even be stored in a display (I/O) format. Applications to Cobol, MIX, and hexadecimal sums are discussed.", 16483 acknowledgement = ack-nhfb, 16484 classcodes = "C5230 (Digital arithmetic methods); C6130 (Data handling techniques)", 16485 classification = "723; 921", 16486 corpsource = "Univ. of Calgary, Calgary, Alta., Canada", 16487 journalabr = "Commun ACM", 16488 keywords = "add; addition; arbitrary base; arbitrary radix arithmetic; Cobol display arithmetic; computer systems programming; data handling; decimal arithmetic; digital arithmetic; mathematical techniques --- Digital Arithmetic; MIX arithmetic; mixed radix arithmetic; numbers; programming; radix conversion; subtract; subtraction; without radix conversion", 16489 treatment = "A Application; T Theoretical or Mathematical", 16490} 16491 16492@Article{Harper:1975:S, 16493 author = "L. H. Harper and T. H. Payne and J. E. Savage and E. Straus", 16494 title = "Sorting {$X + Y$}", 16495 journal = j-CACM, 16496 volume = "18", 16497 number = "6", 16498 pages = "347--350 (or 347--349??)", 16499 month = jun, 16500 year = "1975", 16501 CODEN = "CACMA2", 16502 ISSN = "0001-0782", 16503 MRclass = "68A20", 16504 MRnumber = "51 14641", 16505 mrreviewer = "Forbes D. Lewis", 16506 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16507 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Seiferas/1975.bib", 16508 acknowledgement = ack-nhfb, 16509 classcodes = "C4240 (Programming and algorithm theory); C6130 (Data handling techniques)", 16510 corpsource = "MIT, Dept. of Math., Cambridge, MA, USA", 16511 keywords = "binary comparisons; computational complexity; computing models; data modeling; merge sorting", 16512 keywords = "computation time; computational complexity; merge sorting; merging; sets of numbers; sorting", 16513 treatment = "T Theoretical or Mathematical", 16514} 16515 16516@Article{Wyman:1975:IES, 16517 author = "F. Paul Wyman", 16518 title = "Improved Event-Scanning Mechanisms for Discrete Event Simulation", 16519 journal = j-CACM, 16520 volume = "18", 16521 number = "6", 16522 pages = "350--353", 16523 month = jun, 16524 year = "1975", 16525 CODEN = "CACMA2", 16526 ISSN = "0001-0782", 16527 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16528 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1975.bib", 16529 abstract = "Simulation models of large, complex ``real-world'' applications have occasionally earned the reputation of eating up hours of computer time. This problem may be attributed in part to difficulties such as slow stochastic convergence. However, an additional problem lies in the fact that a significant amount of bookkeeping time is required to keep future events in their proper sequence. This paper presents a method for significantly reducing the time spent scanning future event lists in discrete event simulations. \par There models are presented, all of which improve in effectiveness as the events-list scan problem becomes more burdensome.", 16530 acknowledgement = ack-nhfb, 16531 classcodes = "C7800 (Other computer applications)", 16532 classification = "723", 16533 corpsource = "Bechtel Inc., San Francisco, CA, USA", 16534 country = "USA", 16535 descriptors = "Simulation; time control;", 16536 enum = "3352", 16537 journalabr = "Commun ACM", 16538 keywords = "computer simulation; discrete event simulation; event scanning mechanisms; simulation", 16539 keywords = "bookkeeping time; discrete event simulation; scanning; simulation", 16540 language = "English", 16541 references = "0", 16542 treatment = "P Practical", 16543} 16544 16545@Article{Knuth:1975:ICU, 16546 author = "Donald E. Knuth and Charles T. {Zahn, Jr.}", 16547 title = "Ill-Chosen Use of ``Event''", 16548 journal = j-CACM, 16549 volume = "18", 16550 number = "6", 16551 pages = "360--360", 16552 month = jun, 16553 year = "1975", 16554 CODEN = "CACMA2", 16555 ISSN = "0001-0782", 16556 bibdate = "Tue Sep 20 23:34:24 1994", 16557 acknowledgement = ack-nhfb, 16558} 16559 16560@Article{Courtois:1975:DIS, 16561 author = "P. J. Courtois", 16562 title = "Decomposability, Instabilities, and Saturation in Multiprogramming Systems", 16563 journal = j-CACM, 16564 volume = "18", 16565 number = "7", 16566 pages = "371--377", 16567 month = jul, 16568 year = "1975", 16569 CODEN = "CACMA2", 16570 ISSN = "0001-0782", 16571 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16572 bibsource = "Compendex database", 16573 abstract = "A step-by-step approach to model the dynamic behavior and evaluate the performance of computing systems is proposed. It is based on a technique of variable aggregation and the concept of nearly decomposable systems, both borrowed from Econometrics. This approach is taken in order to identify in multiprogramming paging systems (i) unstable regimes of operations and (ii) critical computing loads which bring the system into states of saturation. This analysis leads to a more complete definition of the circumstances in which ``thrashing'' can set in.", 16574 acknowledgement = ack-nhfb, 16575 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 16576 classification = "723", 16577 corpsource = "MBLE Res. Lab., Brussels, Belgium", 16578 journalabr = "Commun ACM", 16579 keywords = "computer selection and evaluation; computer systems programming; computing systems; decomposable; instabilities; multiprogramming; multiprogramming systems; performance; saturation; storage; virtual", 16580 treatment = "T Theoretical or Mathematical", 16581} 16582 16583@Article{Lauesen:1975:LSB, 16584 author = "Soren Lauesen", 16585 title = "A large semaphore based operating system", 16586 journal = j-CACM, 16587 volume = "18", 16588 number = "7", 16589 pages = "377--389", 16590 month = jul, 16591 year = "1975", 16592 CODEN = "CACMA2", 16593 ISSN = "0001-0782", 16594 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16595 bibsource = "Compendex database", 16596 abstract = "The paper describes the internal structure of a large operating system as a set of cooperating sequential processes. The processes synchronize by means of semaphores and extended semaphores (queue semaphores). The number of parallel processes is carefully justified, and the various semaphore constructions are explained. The system is proved to be free of ``deadly embrace'' (deadlock). The design principle is an alternative to Dijkstra's hierarchical structuring of operating systems. The project management and the performance are discussed, too. The operating system is the first large one using the RC 4000 multiprogramming system.", 16597 acknowledgement = ack-nhfb, 16598 classcodes = "C6150J (Operating systems)", 16599 classification = "723", 16600 corpsource = "Nordisk Brown Boveri, Copenhagen, Denmark", 16601 journalabr = "Commun ACM", 16602 keywords = "computer operating systems; large; multiprogramming system; operating system; operating systems (computers); parallel; parallel processing; processes; RC 4000; semaphore based", 16603 treatment = "P Practical", 16604} 16605 16606@Article{Sager:1975:RLC, 16607 author = "Naomi Sager and Ralph Grishman", 16608 title = "Restriction Language for Computer Grammars of Natural Language", 16609 journal = j-CACM, 16610 volume = "18", 16611 number = "7", 16612 pages = "390--400", 16613 month = jul, 16614 year = "1975", 16615 CODEN = "CACMA2", 16616 ISSN = "0001-0782", 16617 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16618 bibsource = "Compendex database", 16619 abstract = "This paper presents a programming language designed specifically for the compact and perspicuous statement of restrictions of a natural language grammar. It is based on ten years' experience parsing text sentences with the comprehensive English grammar of the N. Y. U. Linguistic String Project, and embodies in its syntax and routines the relations which were found to be useful and adequate for computerized natural language analysis. The language is used in the current implementation of the Linguistic String Parser.", 16620 acknowledgement = ack-nhfb, 16621 classcodes = "C4210 (Formal logic); C6130 (Data handling techniques); C6140D (High level languages); C7820 (Humanities computing)", 16622 classification = "721; 723", 16623 corpsource = "New York Univ., New York, NY, USA", 16624 journalabr = "Commun ACM", 16625 keywords = "automata theory; computational linguistics; computer grammars; computer programming languages; grammars; literature; natural language; oriented languages; parsing; problem; programming language; Restriction Language; text; text editing", 16626 treatment = "A Application; P Practical", 16627} 16628 16629@Article{Parnas:1975:UCT, 16630 author = "D. L. Parnas and D. P. Siewiorek", 16631 title = "Use of the Concept of Transparency in the Design of Hierarchically Structured Systems", 16632 journal = j-CACM, 16633 volume = "18", 16634 number = "7", 16635 pages = "401--408", 16636 month = jul, 16637 year = "1975", 16638 CODEN = "CACMA2", 16639 ISSN = "0001-0782", 16640 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16641 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/softeng.bib", 16642 abstract = "This paper deals with the design of hierarchically structured programming systems. It develops a method for evaluating the cost of requiring programmers to work with an abstraction of a real machine. A number of examples from hardware and software are given as illustrations of the method.", 16643 acknowledgement = ack-nhfb, 16644 classcodes = "C6110 (Systems analysis and programming)", 16645 classification = "723", 16646 corpsource = "Tech. Hochschule Darmstadt, Darmstadt, West Germany", 16647 journalabr = "Commun ACM", 16648 keywords = "abstraction; computer systems programming; cost; design; hierarchically structured systems; programming; real machine; transparency", 16649 treatment = "A Application; T Theoretical or Mathematical", 16650} 16651 16652@Article{Freeman:1975:DMA, 16653 author = "H. Freeman and R. Shapira", 16654 title = "Determining the Minimum-Area Encasing Rectangle for an Arbitrary Closed Curve", 16655 journal = j-CACM, 16656 volume = "18", 16657 number = "7", 16658 pages = "409--413", 16659 month = jul, 16660 year = "1975", 16661 CODEN = "CACMA2", 16662 ISSN = "0001-0782", 16663 MRclass = "68A10 (52A40)", 16664 MRnumber = "51 12018", 16665 mrreviewer = "Jacques Dubois", 16666 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16667 bibsource = "Compendex database", 16668 abstract = "This paper describes a method for finding the rectangle of minimum area in which a given arbitrary plane curve can be contained. The method is of interest in certain packing and optimum layout problems. It consists of first determining the minimal-perimeter convex polygon that encloses the given curve and then selecting the rectangle of minimum area capable of containing this polygon. Three theorems are introduced to show that one side of the minimum-area rectangle must be colinear with an edge of the enclosed polygon and that the minimum-area encasing rectangle for the convex polygon is also the minimum-area rectangle for the curve.", 16669 acknowledgement = ack-nhfb, 16670 classcodes = "B0260 (Optimisation techniques); C1180 (Optimisation techniques)", 16671 classification = "921; 922", 16672 corpsource = "New York Univ., New York, NY, USA", 16673 journalabr = "Commun ACM", 16674 keywords = "enclosed curve; minimum-area encasing rectangle; optimization; optimum layout; optimum packing", 16675 keywords = "arbitrary closed curve; encasing rectangle; minimisation; minimum area; optimum layout; packing", 16676 treatment = "T Theoretical or Mathematical", 16677} 16678 16679@Article{Bobrow:1975:NHL, 16680 author = "Daniel G. Bobrow", 16681 title = "A Note on Hash Linking", 16682 journal = j-CACM, 16683 volume = "18", 16684 number = "7", 16685 pages = "413--415", 16686 month = jul, 16687 year = "1975", 16688 CODEN = "CACMA2", 16689 ISSN = "0001-0782", 16690 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16691 bibsource = "Compendex database", 16692 abstract = "Hash searching is a technique in which a key is mapped into a unique address associated with that key. Most applications of this technique are for insertion and fast retrieval of data records containing key fields. In the use of hash search described in this paper, the key field is the virtual address of a machine cell with which additional information is associated. An address to auxiliary data not contained in that cell is called hash linking. (A hash link function is one which maps any machine virtual address into another unique address where additional information can be stored. ) This note describes several nonobvious applications of this technique.", 16693 acknowledgement = ack-nhfb, 16694 classcodes = "C6120 (File organisation)", 16695 classification = "723; 901", 16696 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 16697 journalabr = "Commun ACM", 16698 keywords = "computer programming; hash linking; information retrieval systems; LISP; locations; machine address; storage; storage allocation", 16699 treatment = "P Practical", 16700} 16701 16702@Article{Weber:1975:DEW, 16703 author = "R. E. Weber and B. Gilchrist", 16704 title = "Discrimination in the employment of women in the computer industry", 16705 journal = j-CACM, 16706 volume = "18", 16707 number = "7", 16708 pages = "416--418", 16709 month = jul, 16710 year = "1975", 16711 CODEN = "CACMA2", 16712 ISSN = "0001-0782", 16713 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16714 acknowledgement = ack-nhfb, 16715 classcodes = "C0200 (General computer topics)", 16716 corpsource = "Rutgers Univ., New Brunswick, NJ, USA", 16717 keywords = "computer industry; discrimination; employment; women", 16718 treatment = "G General Review", 16719} 16720 16721@Article{Shore:1975:ESF, 16722 author = "John E. Shore", 16723 title = "On the External Storage Fragmentation Produced by First-Fit and Best-Fit Allocation Strategies", 16724 journal = j-CACM, 16725 volume = "18", 16726 number = "8", 16727 pages = "433--440", 16728 month = aug, 16729 year = "1975", 16730 CODEN = "CACMA2", 16731 ISSN = "0001-0782", 16732 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16733 bibsource = "Compendex database", 16734 abstract = "Report on some experiments whose results have helped to understand differences in the performance of two well-known storage-allocation strategies, first-fit and best-fit. For exponential and hyperexponential distributions of requests, first-fit outperformed best-fit; but for normal and uniform distributions, and for exponential distributions distorted in various ways, best-fit outperformed first-fit. It is hypothesized that when first-fit outperforms best-fit, it does so because first-fit, by preferentially allocating toward one end of memory, encourages large blocks to grow at the other end. Sufficient contiguous space is thereby more likely to be available for relatively large requests. Results of simulation experiments supported this hypothesis and showed that the relative performance of first-fit and best-fit depends on the frequency of requests that are large compared to the average request. when the coefficient of variation of the request distribution is greater than or approximately equal to unity, first-fit outperformed best-fit.", 16735 acknowledgement = ack-nhfb, 16736 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 16737 classification = "722; 723", 16738 corpsource = "Naval Res. Lab., Washington, DC, USA", 16739 journalabr = "Commun ACM", 16740 keywords = "allocation strategies; best fit; computer operating systems; dynamic memory allocation; encountered block; external storage fragmentation; first fit; pending storage; starting addresses; storage allocation", 16741 treatment = "P Practical", 16742} 16743 16744@Article{Aho:1975:DPA, 16745 author = "A. V. Aho and S. C. Johnson and J. D. Ullman", 16746 title = "Deterministic Parsing of Ambiguous Grammars", 16747 journal = j-CACM, 16748 volume = "18", 16749 number = "8", 16750 pages = "441--452", 16751 month = aug, 16752 year = "1975", 16753 CODEN = "CACMA2", 16754 ISSN = "0001-0782", 16755 MRclass = "68A25", 16756 MRnumber = "51 12033", 16757 mrreviewer = "S. Ginsburg", 16758 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16759 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib", 16760 abstract = "Methods of describing the syntax of programming languages in ways that are more flexible and natural than conventional BNF descriptions are considered. These methods involve the use of ambiguous context-free grammars together with rules to resolve syntactic ambiguities. It is shown how efficient LR and LL parsers can be constructed directly from certain classes of these specifications.", 16761 acknowledgement = ack-nhfb, 16762 classcodes = "C4210 (Formal logic)", 16763 classification = "723", 16764 corpsource = "Bell Labs., Murray Hill, NJ, USA", 16765 journalabr = "Commun ACM", 16766 keywords = "ambiguities; ambiguous grammars; computer programming languages; context free grammars; context-free grammars; LL parsers; LR parsing; parser generation; programming languages; syntactic; translator writing systems", 16767 treatment = "T Theoretical or Mathematical", 16768} 16769 16770@Article{Dijkstra:1975:GCN, 16771 author = "Edsger W. Dijkstra", 16772 title = "Guarded Commands, Nondeterminacy and Formal Derivation of Programs", 16773 journal = j-CACM, 16774 volume = "18", 16775 number = "8", 16776 pages = "453--457", 16777 month = aug, 16778 year = "1975", 16779 CODEN = "CACMA2", 16780 ISSN = "0001-0782", 16781 MRclass = "68A05", 16782 MRnumber = "52 4688", 16783 mrreviewer = "John Kam", 16784 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16785 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.synch.bib", 16786 abstract = "So-called ``guarded commands'' are introduced as a building block for alternative and repetitive constructs that allow nondeterministic program components for which at least the activity evoked, but possibly even the final state, is not necessarily uniquely determined by the initial state. For the formal derivation of programs expressed in terms of these constructs, a calculus is shown.", 16787 acknowledgement = ack-nhfb, 16788 annote = "Yet another ancient paper which is occasionally cited", 16789 classcodes = "C4210 (Formal logic)", 16790 classification = "723", 16791 corpsource = "Burroughs Corp., Nuenen, Netherlands", 16792 journalabr = "Commun ACM", 16793 keywords = "calculus; computer programming languages; constructs; correctness proof; derivation; guarded commands; k-guarded-commands; nondeterministic program components; programming language semantics; programming languages; programming methodology; sequencing primitives", 16794 treatment = "A Application; P Practical", 16795} 16796 16797@Article{Cotton:1975:RSU, 16798 author = "L. W. Cotton", 16799 title = "Remark on stably updating mean and standard deviation of data", 16800 journal = j-CACM, 16801 volume = "18", 16802 number = "8", 16803 pages = "458--458", 16804 month = aug, 16805 year = "1975", 16806 CODEN = "CACMA2", 16807 ISSN = "0001-0782", 16808 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16809 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib and ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib", 16810 acknowledgement = ack-nhfb, 16811 classcodes = "B0290F (Interpolation and function approximation); C4130 (Interpolation and function approximation); C7310 (Mathematics computing)", 16812 corpsource = "Nat. Bur. of Stand., Washington, DC, USA", 16813 country = "USA", 16814 descriptors = "Simulation; statistics; numeric calculation;", 16815 enum = "7158", 16816 keywords = "algorithm; Hanson's article; new; numbers; numerical methods; remark; sequentially recomputing; series; stably updating mean; standard deviation of data; statistics", 16817 kwds = "stat, updating, mean, standard deviation, variance", 16818 language = "English", 16819 location = "SEL: Wi", 16820 references = "0", 16821 revision = "16/01/94", 16822 treatment = "A Application; G General Review", 16823 xxauthor = "I. W. Cotton", 16824} 16825 16826@Article{Shapiro:1975:ICN, 16827 author = "Stuart C. Shapiro and Stanley C. Kwasny", 16828 title = "Interactive Consulting via Natural Language", 16829 journal = j-CACM, 16830 volume = "18", 16831 number = "8", 16832 pages = "459--462", 16833 month = aug, 16834 year = "1975", 16835 CODEN = "CACMA2", 16836 ISSN = "0001-0782", 16837 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16838 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/expert.bib", 16839 abstract = "Interactive programming systems often contain help commands to give the programmer on-line instruction regarding the use of the various systems commands. It is argued that it would be relatively easy to make these help commands significantly more helpful by having them accept requests in natural language. As a demonstration, Weizenbaum's ELIZA program has been provided with a script that turns it into a natural language system consultant.", 16840 acknowledgement = ack-nhfb, 16841 annote = "Help commands are significantly more useful in an interactive environment if they accept commands in a natural language. As a demonstration, Weizenbaum's ELIZA program has been provided with a script that turns into a natural language system consultant.", 16842 classcodes = "C6110 (Systems analysis and programming); C6140 (Programming languages); C6150J (Operating systems)", 16843 classification = "723", 16844 corpsource = "Indiana Univ., Bloomington, IN, USA", 16845 journalabr = "Commun ACM", 16846 keywords = "computer aided instruction; computer assisted instruction; computer programming languages; ELIZA; help commands; instruction; interactive programming; natural language; natural language processing; natural language system consultant; on line; program; programming languages; sharing programs; systems commands; time sharing systems; time-; time-sharing systems", 16847 treatment = "T Theoretical or Mathematical", 16848} 16849 16850@Article{Todd:1975:CLC, 16851 author = "John Todd", 16852 title = "Corrigendum: {``The Lemniscate Constants''}", 16853 journal = j-CACM, 16854 volume = "18", 16855 number = "8", 16856 pages = "462--462", 16857 month = aug, 16858 year = "1975", 16859 CODEN = "CACMA2", 16860 ISSN = "0001-0782", 16861 bibdate = "Tue Dec 26 18:42:09 1995", 16862 note = "See \cite{Todd:1975:LC}.", 16863} 16864 16865@Article{Vaucher:1975:CCS, 16866 author = "J. G. Vaucher and P. Duval", 16867 title = "Corrigendum: ``{A comparison of simulation event list algorithms}''", 16868 journal = j-CACM, 16869 volume = "18", 16870 number = "8", 16871 pages = "462--462", 16872 month = aug, 16873 year = "1975", 16874 CODEN = "CACMA2", 16875 ISSN = "0001-0782", 16876 bibdate = "Sat Jan 18 15:17:34 1997", 16877 note = "See \cite{Vaucher:1975:CSE}.", 16878} 16879 16880@Article{Smith:1975:CPT, 16881 author = "A. J. Smith", 16882 title = "Comments on a paper by {T. C. Chen} and {I. T. Ho}", 16883 journal = j-CACM, 16884 volume = "18", 16885 number = "8", 16886 pages = "463--463", 16887 month = aug, 16888 year = "1975", 16889 CODEN = "CACMA2", 16890 ISSN = "0001-0782", 16891 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16892 acknowledgement = ack-nhfb, 16893 classcodes = "C6130 (Data handling techniques)", 16894 corpsource = "Univ. of California, Berkeley, CA, USA", 16895 keywords = "advantages; alternatives; binary coded decimal; codes; coding; compression of numbers; data handling; decimal data; decoding; deletions; Huffman codes; insertions; permutations; storage efficient representation; variable length codes", 16896 treatment = "G General Review; T Theoretical or Mathematical", 16897} 16898 16899@Article{Ghosh:1975:CSR, 16900 author = "Sakti P. Ghosh", 16901 title = "Consecutive Storage of Relevant Records with Redundancy", 16902 journal = j-CACM, 16903 volume = "18", 16904 number = "8", 16905 pages = "464--471", 16906 month = aug, 16907 year = "1975", 16908 CODEN = "CACMA2", 16909 ISSN = "0001-0782", 16910 MRclass = "68A50", 16911 MRnumber = "52 4743", 16912 mrreviewer = "K. H. V. Booth", 16913 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16914 bibsource = "Compendex database", 16915 abstract = "This paper studies the properties of a new class of file organizations (CRWR) where records relevant to every query are stored in consecutive storage locations but the organizations contain redundancy. Some theorems which provide tools for reducing redundancy in CRWR organizations have been also developed. Redundancies obtained by the application of these theorems are compared with that of query-inverted file organizations. Some CRWR organizations with minimum redundancy have also been developed for queries which specify sets of keys.", 16916 acknowledgement = ack-nhfb, 16917 classcodes = "C6120 (File organisation)", 16918 classification = "723", 16919 corpsource = "IBM Res. Lab., San Jose, CA, USA", 16920 journalabr = "Commun ACM", 16921 keywords = "consecutive storage; data processing; file organisation; file organizations; keys; query; records; redundancy; retrieval", 16922 treatment = "N New Development; T Theoretical or Mathematical", 16923} 16924 16925@Article{Lamport:1975:MBP, 16926 author = "Leslie Lamport", 16927 title = "Multiple Byte Processing with Full-Word Instructions", 16928 journal = j-CACM, 16929 volume = "18", 16930 number = "8", 16931 pages = "471--475", 16932 month = aug, 16933 year = "1975", 16934 CODEN = "CACMA2", 16935 ISSN = "0001-0782", 16936 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16937 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/Seiferas/1975.bib", 16938 abstract = "A method is described which allows parallel processing of packed data items using only ordinary full-word computer instructions, even though the processing requires operations whose execution is contingent upon the value of a datum. It provides a useful technique for processing small data items such as alphanumeric characters.", 16939 acknowledgement = ack-nhfb, 16940 classcodes = "C6110 (Systems analysis and programming)", 16941 classification = "723", 16942 corpsource = "Massachusetts Computer Associates, Inc., Wakefield, MA, USA", 16943 journalabr = "Commun ACM", 16944 keywords = "alphanumeric characters; byte processing; character processing; data processing; datum; full-word instructions; packed data; parallel; parallel processing; processing; programming", 16945 treatment = "P Practical", 16946} 16947 16948@Article{Shwayder:1975:CDR, 16949 author = "Keith Shwayder", 16950 title = "Combining Decision Rules in a Decision Table", 16951 journal = j-CACM, 16952 volume = "18", 16953 number = "8", 16954 pages = "476--480", 16955 month = aug, 16956 year = "1975", 16957 CODEN = "CACMA2", 16958 ISSN = "0001-0782", 16959 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16960 bibsource = "Compendex database", 16961 abstract = "The techniques for minimizing logic circuits are applied to the simplification of decision tables by the combining of decision rules. This method is logically equivalent to the Quine-McCluskey method for finding prime implicants. If some of the decision rules implied in the ELSE Rule occur with low frequency, then the ELSE Rule can be used to further simplify the decision table. Several objectives merit consideration in optimizing a decision table. (1) reducing machine execution time; (2) reducing preprocessing time; (3) reducing required machine memory; (4) reducing the number of decision rules. Objectives (3) and (4) can be furthered with the above methods. Objective (1) is also attained if overspecified decision rules are not combined. Objective (2) must be compared against the potential benefits of objectives (1), (3), and (4) in deciding whether to use the above methods.", 16962 acknowledgement = ack-nhfb, 16963 classcodes = "C6110 (Systems analysis and programming)", 16964 classification = "723", 16965 corpsource = "Samsonite Corp., Furniture Div., Denver, CO, USA", 16966 journalabr = "Commun ACM", 16967 keywords = "Boolean method; coding; computer systems programming; decision rules; decision table; decision tables; flowcharting; minimisation; minimizing logic circuits; prime implicants; Quine McCluskey method; sorting", 16968 treatment = "T Theoretical or Mathematical", 16969} 16970 16971@Article{Steele:1975:MCG, 16972 author = "Guy L. {Steele, Jr.}", 16973 title = "Multiprocessing Compactifying Garbage Collection", 16974 journal = j-CACM, 16975 volume = "18", 16976 number = "9", 16977 pages = "495--508", 16978 month = sep, 16979 year = "1975", 16980 CODEN = "CACMA2", 16981 ISSN = "0001-0782", 16982 bibdate = "Tue Mar 25 13:26:09 MST 1997", 16983 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 16984 note = "See corrigendum \cite{Steele:1976:CMC}.", 16985 abstract = "Algorithms for a multiprocessing compactifying garbage collector are presented and discussed. \par The simple case of two processors, one performing LISP-like list operations and the other performing garbage collection continuously, is thoroughly examined. The necessary capabilities of each processor are defined, as well as interprocessor communication and interlocks. Complete procedures for garbage collection and for standard list processing primitives are presented and thoroughly explained. Particular attention is given to the problems of marking and relocating list cells while another processor may be operating on them. The primary aim throughout is to allow the list processor to run unimpeded while the other processor reclaims list storage. The more complex cases involving several list processors and one or more garbage collection processors are also briefly discussed.", 16986 acknowledgement = ack-nhfb, 16987 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 16988 classification = "723", 16989 corpsource = "Harvard Univ., Cambridge, MA, USA", 16990 journalabr = "Commun ACM", 16991 keywords = "capabilities; compactification; computer systems programming; data structures; free storage; garbage collection; gc processor; interlocks; interprocessor communication; LISP; list; list processing; list storage; management; multiprocessing; multiprocessing compactifying garbage collector; multiprocessing programs; operations; parallel processing; pointers; reclaimer; relocation; semaphores; storage; storage allocation; storage reclamation; synchronization", 16992 treatment = "P Practical", 16993} 16994 16995@Article{Bentley:1975:MBS, 16996 author = "Jon Louis Bentley", 16997 title = "Multidimensional Binary Search Trees Used for Associative Searching", 16998 journal = j-CACM, 16999 volume = "18", 17000 number = "9", 17001 pages = "509--517", 17002 month = sep, 17003 year = "1975", 17004 CODEN = "CACMA2", 17005 ISSN = "0001-0782", 17006 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17007 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 17008 abstract = "This paper develops the multidimensional binary search tree (or k-d tree, where k is the dimensionality of the search space) as a data structure for storage of information to be retrieved by associative searches. The k-d tree is defined and examples are given. It is shown to be quite efficient in its storage requirements. A significant advantage of this structure is that a single data structure can handle many types of queries very efficiently. Various utility algorithms are developed.", 17009 acknowledgement = ack-nhfb, 17010 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 17011 classification = "723; 901", 17012 corpsource = "Stanford Univ., Stanford, CA, USA", 17013 journalabr = "Commun ACM", 17014 keywords = "algorithm; content-addressable storage; data structures; efficient; homogeneous splitting; information; information retrieval; information retrieval systems; intersection query; K-D trees; multidimensional binary search tree; partial match; queries; retrieval; running times; single data; structure; trees (mathematics); utility algorithms", 17015 treatment = "T Theoretical or Mathematical", 17016} 17017 17018@Article{Claudson:1975:DSR, 17019 author = "R. Mark Claudson", 17020 title = "Digital Simulation of River Plankton Population Dynamics", 17021 journal = j-CACM, 17022 volume = "18", 17023 number = "9", 17024 pages = "517--523", 17025 month = sep, 17026 year = "1975", 17027 CODEN = "CACMA2", 17028 ISSN = "0001-0782", 17029 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17030 bibsource = "Compendex database", 17031 abstract = "This paper deals with the development of a mathematical model for and the digital simulation in Fortran IV of phytoplankton and zooplankton population densities in a river using previously developed rate expressions. As an investigation of the accuracy of the simulation methods, a simulation of the actual population dynamics of Asterionella in the Columbia River was made based on approximations of conditions in that river. The study demonstrates the usefulness of digital simulations in the examinations of certain aquatic ecosystems, as well as in environmental planning involving such examinations.", 17032 acknowledgement = ack-nhfb, 17033 classcodes = "C7330 (Biology and medical computing); C7440 (Civil and mechanical engineering computing)", 17034 classification = "723; 901", 17035 corpsource = "Hanford High School, Richland, WA, USA", 17036 journalabr = "Commun ACM", 17037 keywords = "approximations; aquatic ecosystems; computer simulation; digital simulation; ecological mechanisms; ecology; environmental engineering; environmental simulation; expressions; FORTRAN; mathematical modelling; mathematical models; pollution; rate; river plankton population dynamics; simulation; velocity cycle", 17038 treatment = "A Application; T Theoretical or Mathematical", 17039} 17040 17041@Article{Piepmeier:1975:OBI, 17042 author = "William F. Piepmeier", 17043 title = "Optimal Balancing of {I/O} Requests to Disks", 17044 journal = j-CACM, 17045 volume = "18", 17046 number = "9", 17047 pages = "524--527", 17048 month = sep, 17049 year = "1975", 17050 CODEN = "CACMA2", 17051 ISSN = "0001-0782", 17052 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17053 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1975.bib", 17054 abstract = "Determining a policy for efficient allocation and utilization of a set of disk drives with differing operational characteristics is examined using analytical techniques. Using standard queueing theory, each disk drive is characterized by a queueing model with service time of a disk drive represented by the probability density function of the sum of two uniform distributions. Total response time of the set of disk models is then minimized under varying load conditions. The results indicate that faster devices should have higher utilization factors and that the number of different device types utilized tends to decrease with decreasing load. Specific examples using 2314 and 3330 combinations are examined.", 17055 acknowledgement = ack-nhfb, 17056 annote = "Determining a policy for efficient allocation and utilization of a set of disk drives with differing operational characteristics is examined using analytical techniques. Using standard queueing theory, each disk drive is characterized by a queueing model with service time of a disk drive represented by the probability density function of the sum of two uniform distributions. Total resp. time of the set of disk is minim. under vary. load. cond.", 17057 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 17058 classification = "921; 922", 17059 corpsource = "Washington Univ., Saint Louis, MO, USA", 17060 country = "USA", 17061 descriptors = "Analysis; queueing theory; queueing system; model; disk; system evaluation; scheduling; distribution;", 17062 enum = "3649", 17063 journalabr = "Commun ACM", 17064 keywords = "allocation; analytical techniques; balancing; characteristics; device assignment; disc; drives; efficient allocation; file organisation; input/output; modelling; operational; optimization; probability --- Queueing Theory; probability density function; queueing theory; scheduling; storage; utilization factors", 17065 language = "English", 17066 references = "5", 17067 treatment = "A Application; T Theoretical or Mathematical", 17068} 17069 17070@Article{Wegbreit:1975:MPA, 17071 author = "Ben Wegbreit", 17072 title = "Mechanical Program Analysis", 17073 journal = j-CACM, 17074 volume = "18", 17075 number = "9", 17076 pages = "528--539", 17077 month = sep, 17078 year = "1975", 17079 CODEN = "CACMA2", 17080 ISSN = "0001-0782", 17081 MRclass = "68A05", 17082 MRnumber = "53 9701", 17083 mrreviewer = "A. D. Booth", 17084 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17085 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib", 17086 abstract = "One means of analyzing program performance is by deriving closed-form expressions for their execution behavior. This paper discusses the mechanization of such analysis, and describes a system, Metric, which is able to analyze simple Lisp programs and produce, for example, closed-form expressions for their running time expressed in terms of size of input. This paper presents the reasons for mechanizing program analysis, describes the operation of Metric, explains its implementation, and discusses its limitations.", 17087 acknowledgement = ack-nhfb, 17088 classcodes = "C6110 (Systems analysis and programming); C6140D (High level languages); C6150G (Diagnostic, testing, debugging and evaluating systems)", 17089 classification = "723", 17090 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 17091 journalabr = "Commun ACM", 17092 keywords = "algebraic manipulation; analysis; computer programming languages; execution behaviour; functional lisp; generating functions; LISP; lisp; list; mechanization; mechanizing program; metric; performance; processing; program analysis; programming; programming languages; programs; running time; size of input", 17093 treatment = "P Practical", 17094} 17095 17096@Article{Gerritsen:1975:PSD, 17097 author = "Rob Gerritsen", 17098 title = "A Preliminary System for the Design of {DBTG} Data Structures", 17099 journal = j-CACM, 17100 volume = "18", 17101 number = "10", 17102 pages = "551--557", 17103 month = oct, 17104 year = "1975", 17105 CODEN = "CACMA2", 17106 ISSN = "0001-0782", 17107 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17108 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17109 abstract = "The functional approach to database design is introduced. In this approach the goal of design is to derive a data structure which is capable of supporting a set of anticipated queries rather than a structure which ``models the business'' in some other way. An operational computer program is described which utilizes the functional approach to design data structures conforming to the Data Base Task Group specifications. The automatic programming technology utilized by this program, although typically used to generate procedure, is here used to generate declaratives.", 17110 acknowledgement = ack-nhfb, 17111 classcodes = "C6120 (File organisation)", 17112 classification = "723", 17113 corpsource = "Univ. of Pennsylvania, Philadelphia, PA, USA", 17114 journalabr = "Commun ACM", 17115 keywords = "automatic programming; Data Base; data processing; data structures; database design; functional approach; nonprocedural languages; operational computer program; preliminary system; Task Group; translation", 17116 review = "ACM CR 7604-??", 17117 treatment = "A Application; T Theoretical or Mathematical", 17118} 17119 17120@Article{Shu:1975:CHL, 17121 author = "Nan C. Shu and Barron C. Housel and Vincent Y. Lum", 17122 title = "{CONVERT}: {A} High Level Translation Definition Language for Data Conversion", 17123 journal = j-CACM, 17124 volume = "18", 17125 number = "10", 17126 pages = "557--567", 17127 month = oct, 17128 year = "1975", 17129 CODEN = "CACMA2", 17130 ISSN = "0001-0782", 17131 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17132 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17133 note = "Also published in/as: 19 ACM SIGMOD Conf. on the Management of Data, King(ed), May.1975.", 17134 abstract = "This paper describes a high level and nonprocedural translation definition language, CONVERT, which provides very powerful and highly flexible data restructuring capabilities. Its design is based on the simple underlying concept of a form which enables the users to visualize the translation processes, and thus makes data translation a much simpler task.", 17135 acknowledgement = ack-nhfb, 17136 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", 17137 classification = "723", 17138 corpsource = "IBM Res. Lab., San Jose, CA, USA", 17139 journalabr = "Commun ACM", 17140 keywords = "computer programming languages; convert; data; data conversion; data handling; data processing --- Data Structures; data translation; database reorganisation; nonprocedural translation definition language; problem oriented languages; programming languages; restructuring; translation definition language; utility program", 17141 treatment = "A Application; P Practical", 17142} 17143 17144@Article{Smith:1975:OPR, 17145 author = "John Miles Smith and Philip Yen-Tang Chang", 17146 title = "Optimizing the Performance of a Relational Algebra Data Base Interface", 17147 journal = j-CACM, 17148 volume = "18", 17149 number = "10", 17150 pages = "568--579", 17151 month = oct, 17152 year = "1975", 17153 CODEN = "CACMA2", 17154 ISSN = "0001-0782", 17155 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17156 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17157 abstract = "A relational algebra interface, called SQUIRAL, is described in detail. SQUIRAL seeks to minimize query response time and space utilization by: (1) performing global query optimization, (2) exploiting disjoint and pipelined concurrency, (3) coordinating sort orders in temporary relations, (4) employing directory analysis, and (5) maintaining locality in page references. Algorithms for implementing the operators of E. F. Codd's relational algebra are presented, and a methodology for composing them to optimize the performance of a particular user query is described.", 17158 acknowledgement = ack-nhfb, 17159 classcodes = "C6120 (File organisation)", 17160 classification = "723", 17161 corpsource = "Univ. of Utah, Salt Lake City, UT, USA", 17162 journalabr = "Commun ACM", 17163 keywords = "automatic; data; data processing; directory analysis; file; global query optimisation; inverted; manipulation language; optimisation; pipelined concurrency; programming; query response; query specification; relational algebra database interface; sort orders; space utilization; SQUIRAL; time; very high level language", 17164 treatment = "T Theoretical or Mathematical", 17165} 17166 17167@Article{Astrahan:1975:ISE, 17168 author = "M. M. Astrahan and D. D. Chamberlin", 17169 title = "Implementation of a {Structured English Query Language}", 17170 journal = j-CACM, 17171 volume = "18", 17172 number = "10", 17173 pages = "580--588", 17174 month = oct, 17175 year = "1975", 17176 CODEN = "CACMA2", 17177 ISSN = "0001-0782", 17178 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17179 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17180 note = "Also published in/as: 19 ACM SIGMOD Conf. on the Management of Data, King(ed), May.1975", 17181 abstract = "SEQUEL is a nonprocedural language which does not make use of quantifiers or other mathematical concepts; rather, SEQUEL uses a block structured format of English key words (hence the acronym ``Structured English Query Language'' ). SEQUEL is intended for interactive, problem solving use by people who have need for interaction with a large database but who are not trained programmers. This class of users includes urban planners, sociologists, accountants, and other professionals. The objective of the language is to provide a simple, easy-to-learn means of expressing the primitive actions used by people to obtain information from tables, such as ``look up a value in a column.'' SEQUEL and its companion language, SQUARE, have been shown to be relationally complete, i.e. equivalent in power to Codd's relational calculus.", 17182 acknowledgement = ack-nhfb, 17183 annote = "Description of implementation of SEQUEL interpreter, especially optimizer, which uses indexes to simplify queries.", 17184 classcodes = "C6130 (Data handling techniques); C6140D (High level languages); C6150C (Compilers, interpreters and other processors)", 17185 classification = "723", 17186 corpsource = "IBM Res. Div., San Jose, CA, USA", 17187 journalabr = "Commun ACM", 17188 keywords = "CACM; data accessing; data handling; data organisation; data processing; data structure; data structures; data sublanguage; database; nonprocedural language; operations; optimisation algorithms; problem oriented languages; program interpreters; prototype interpreter; relation database IBM San Jose; relational model; SEQUEL; structured English query language", 17189 treatment = "A Application; T Theoretical or Mathematical", 17190} 17191 17192@Article{Gavril:1975:MPP, 17193 author = "Fanica Gavril", 17194 title = "Merging with Parallel Processors", 17195 journal = j-CACM, 17196 volume = "18", 17197 number = "10", 17198 pages = "588--591", 17199 month = oct, 17200 year = "1975", 17201 CODEN = "CACMA2", 17202 ISSN = "0001-0782", 17203 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17204 bibsource = "Compendex database", 17205 abstract = "Consider two linearly ordered sets A, B, vertical A vertical equals m, vertical B vertical equals n, m less than equivalent to n, and p,p less than equivalent to m, parallel processors working synchronously. The paper presents an algorithm for merging A and B with the p parallel processors, which requires at most 2 left bracket log//2(2m plus 1) right bracket plus left bracket 3m/p right bracket plus left bracket m/p right bracket left bracket log//2(n/m) right bracket steps. If n equals 2** beta m ( beta an integer), the algorithm requires at most 2 left bracket log//2(m plus 1) right bracket plus left bracket m/p right bracket (2 plus beta ) steps. In the case where m and n are of the same order of magnitude, i.e. n equals km with k being a constant, the algorithm requires 2 left bracket log//2(m plus 1) right bracket plus right bracket m/p right bracket (3 plus k) steps. These performances compare very favorably with the previous best parallel merging algorithm, Batcher's algorithm, which requires n/p plus ((m plus n)/2p)log//2m steps in the general case and km/p plus ((k plus l)/2)(m/p)log//2m in the special case where n equals km.", 17206 acknowledgement = ack-nhfb, 17207 classcodes = "C4240 (Programming and algorithm theory)", 17208 classification = "722; 723", 17209 corpsource = "Univ. of Illinois, Chicago, IL, USA", 17210 journalabr = "Commun ACM", 17211 keywords = "Batcher's algorithm; computer systems programming --- Sorting; computer systems, digital; linearly ordered sets; merging; parallel binary insertion; parallel processing; parallel processors; programming theory", 17212 treatment = "T Theoretical or Mathematical", 17213} 17214 17215@Article{Reiser:1975:HRE, 17216 author = "M. Reiser and H. Kobayashi", 17217 title = "{Horner}'s Rule for the Evaluation of General Closed Queueing Networks", 17218 journal = j-CACM, 17219 volume = "18", 17220 number = "10", 17221 pages = "592--593", 17222 month = oct, 17223 year = "1975", 17224 CODEN = "CACMA2", 17225 ISSN = "0001-0782", 17226 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17227 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1975.bib", 17228 abstract = "The solution of separable closed queueing networks requires the evaluation of homogeneous multinomial expressions. The number of terms in those expressions grows combinatorially with the size of the network such that a direct summation may become impractical. An algorithm is given which does not show a combinatorial operation count. The algorithm is based on a generalization of Horner's rule for polynomials. It is also shown how mean queue size and throughput can be obtained at negligible extra cost once the normalization constant is evaluated.", 17229 acknowledgement = ack-nhfb, 17230 annote = "An algorithm is given which makes it possible to solve separable closed queueing networks independent from the size of the network. The algorithm does not show a combinatorial operation count; it is based on a generalization of Horner's rule for polynomials. Also is shown how mean queue size and throughput can be obtained at negligible extra cost once the normalization constant is evaluated.", 17231 classcodes = "B0240C (Queueing theory); C1140C (Queueing theory)", 17232 classification = "723; 912; 922", 17233 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 17234 country = "USA", 17235 descriptors = "Closed queueing network; algorithm; evaluation;", 17236 enum = "3660", 17237 journalabr = "Commun ACM", 17238 keywords = "closed queueing networks; combinatorial operation count; expressions; homogeneous multinomial; Horner's rule; load dependent service rate; multinomial sums; operations research --- Computer Applications; probability; queueing theory", 17239 language = "English", 17240 references = "8", 17241 treatment = "T Theoretical or Mathematical", 17242} 17243 17244@Article{Salton:1975:VSM, 17245 author = "G. Salton and A. Wong and C. S. Yang", 17246 title = "A Vector Space Model for Automatic Indexing", 17247 journal = j-CACM, 17248 volume = "18", 17249 number = "11", 17250 pages = "613--620", 17251 month = nov, 17252 year = "1975", 17253 CODEN = "CACMA2", 17254 ISSN = "0001-0782", 17255 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17256 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17257 abstract = "In a document retrieval, or other pattern matching environment where stored entities (documents) are compared with each other or with incoming patterns (search requests), it appears that the best indexing (property) space is one where each entity lies as far away from the others as possible; in these circumstances the value of an indexing system may be expressible as a function of the density of the object space; in particular, retrieval performance may correlate inversely with space density. An approach based on space density computations is used to choose an optimum indexing vocabulary for a collection of documents. Typical evaluation results are shown, demonstrating the usefulness of the model.", 17258 acknowledgement = ack-nhfb, 17259 annote = "Optimizing of relationship strength based data access.", 17260 classcodes = "C6130 (Data handling techniques); C7240 (Information analysis and indexing)", 17261 classification = "723; 901", 17262 corpsource = "Cornell Univ., Ithaca, NY, USA", 17263 journalabr = "Commun ACM", 17264 keywords = "automatic indexing; content analysis; density; document retrieval; incoming patterns; indexing; information science; library mechanisation; pattern matching environment; space; vector space model", 17265 treatment = "A Application; P Practical", 17266} 17267 17268@Article{Boyce:1975:SQR, 17269 author = "Raymond F. Boyce and Donald D. Chamberlin and W. Frank {King, III} and Michael M. Hammer", 17270 title = "Specifying Queries as Relational Expressions: The Square Data Sublanguage", 17271 journal = j-CACM, 17272 volume = "18", 17273 number = "11", 17274 pages = "621--628", 17275 month = nov, 17276 year = "1975", 17277 CODEN = "CACMA2", 17278 ISSN = "0001-0782", 17279 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17280 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17281 note = "Also published in/as: in Douque74 (IFIP TC-2), 1974. Also published in/as: ACM SIGPLAN-SIGIR 1974, Nance (ed), pp. 31--47. Also published in/as: IBM, San Jose Research Report RJ1291, October 1973.", 17282 abstract = "This paper presents a data sublanguage called SQUARE, intended for use in ad hoc, interactive problem solving by non-computer specialists. SQUARE is based on the relational model of data, and is shown to be relationally complete; however, it avoids the quantifiers and bound variables required by languages based on the relational calculus. Facilities for query, insertion, deletion, and update on tabular data bases are described. A syntax is given, and suggestions are made for alternative syntaxes, including a syntax based on English key words for users with limited mathematical background.", 17283 acknowledgement = ack-nhfb, 17284 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", 17285 classification = "723", 17286 corpsource = "IBM Res. Lab., San Jose, CA, USA", 17287 journalabr = "Commun ACM", 17288 keywords = "casual user; data processing; data sublanguage; database; English key words; interactive problem; nonprocedural language; problem oriented languages; query languages; relational calculus; relational expressions; SQUARE; square; tabular data", 17289 treatment = "A Application; P Practical", 17290} 17291 17292@Article{Ledgard:1975:GCS, 17293 author = "Henry F. Ledgard and Michael Marcotty", 17294 title = "A genealogy of control structures", 17295 journal = j-CACM, 17296 volume = "18", 17297 number = "11", 17298 pages = "629--639", 17299 month = nov, 17300 year = "1975", 17301 CODEN = "CACMA2", 17302 ISSN = "0001-0782", 17303 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17304 bibsource = "Compendex database", 17305 abstract = "The classic result of Bohm and Jacopini on the theoretical completeness of if-then-else and while-do is discussed. Several recent ideas on control structures are then explored. These include a review of various other control structures, results on time\slash space limitations, and theorems relating the relative power of control structures under several notions of equivalence. In conclusion, the impact of theoretical results on the practicing programmer and the importance of one-in, one-out control structures as operational abstractions are discussed. It is argued further that there is insufficient evidence to warrant more than if-then-else, while-do, and their variants.", 17306 acknowledgement = ack-nhfb, 17307 classcodes = "C4290 (Other computer theory); C6110 (Systems analysis and programming)", 17308 classification = "723", 17309 corpsource = "Univ. of Massachusetts, Amherst, MA, USA", 17310 journalabr = "Commun ACM", 17311 keywords = "computer programming languages; go to statements; language design; operational abstractions; PASCAL; program control structures; programming; structured programming", 17312 treatment = "A Application; T Theoretical or Mathematical", 17313} 17314 17315@Article{Graham:1975:PSE, 17316 author = "Susan L. Graham and Steven P. Rhodes", 17317 title = "Practical Syntactic Error Recovery", 17318 journal = j-CACM, 17319 volume = "18", 17320 number = "11", 17321 pages = "639--650 (or 639--649??)", 17322 month = nov, 17323 year = "1975", 17324 CODEN = "CACMA2", 17325 ISSN = "0001-0782", 17326 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17327 bibsource = "Compendex database", 17328 abstract = "This paper describes a recovery scheme for syntax errors which provides automatically-generated high quality recovery with good diagnostic information at relatively low cost. Previous recovery techniques are summarized and empirical comparisons are made. Suggestions for further research on this topic conclude the paper.", 17329 acknowledgement = ack-nhfb, 17330 classcodes = "C6110 (Systems analysis and programming); C6150C (Compilers, interpreters and other processors); C6150G (Diagnostic, testing, debugging and evaluating systems)", 17331 classification = "723", 17332 corpsource = "Univ. of California, Berkeley, CA, USA", 17333 journalabr = "Commun ACM", 17334 keywords = "compilers; computer programming languages; correction; debugging; diagnostic information; error; error compensation; error correction; parsing; program compilers; program debugging; simple precedence; syntactic error recovery; system recovery", 17335 treatment = "T Theoretical or Mathematical", 17336} 17337 17338@Article{Bitner:1975:BPT, 17339 author = "James R. Bitner and Edward M. Reingold", 17340 title = "Backtrack Programming Techniques", 17341 journal = j-CACM, 17342 volume = "18", 17343 number = "11", 17344 pages = "651--656", 17345 month = nov, 17346 year = "1975", 17347 CODEN = "CACMA2", 17348 ISSN = "0001-0782", 17349 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17350 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/graph.coloring.bib", 17351 abstract = "The purpose of this paper is twofold. First, a brief exposition of the general backtrack technique and its history is given. Second, it is shown how the use of macros can considerably shorten the computation time in many cases. In particular, this technique has allowed the solution of two previously open combinatorial problems, the computation of new terms in a well-known series, and the substantial reduction in computation time for the solution to another combinatorial problem.", 17352 acknowledgement = ack-nhfb, 17353 classcodes = "C4240 (Programming and algorithm theory); C6100 (Software techniques and systems)", 17354 classification = "723", 17355 corpsource = "Univ. of Illinois, Urbana, IL, USA", 17356 journalabr = "Commun ACM", 17357 keywords = "backtrack; combinatorial computing; combinatorial problems; computer programming; depth first search; depth-first search; difference-preserving codes; exhaustive; exhaustive search; graph coloring related algorithms; macros; non-attacking queen's problem; nonattacking queen's problem; pentominoes; problems; programming theory; search; shorten the computation time; squaring the square; tiling; tiling problems", 17358 treatment = "A Application; T Theoretical or Mathematical", 17359} 17360 17361@Article{Kou:1975:NSB, 17362 author = "Lawrence T. Kou and C. K. Wong", 17363 title = "A Note on the Set Basis Problem Related to the Compaction of Character Sets", 17364 journal = j-CACM, 17365 volume = "18", 17366 number = "11", 17367 pages = "656--657", 17368 month = nov, 17369 year = "1975", 17370 CODEN = "CACMA2", 17371 ISSN = "0001-0782", 17372 MRclass = "68A10", 17373 MRnumber = "52 7196", 17374 mrreviewer = "Dorothy Bollman", 17375 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17376 bibsource = "Compendex database", 17377 abstract = "This note discusses the reduction of the set basis problem to the clique cover problem.", 17378 acknowledgement = ack-nhfb, 17379 classcodes = "C4240 (Programming and algorithm theory)", 17380 classification = "723", 17381 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 17382 journalabr = "Commun ACM", 17383 keywords = "character sets; clique; compaction of character sets; computational complexity; computer programming; cover problem; data compression; polynomial completeness; set basis problem; set covering", 17384 treatment = "T Theoretical or Mathematical", 17385} 17386 17387@Article{Naur:1975:PLN, 17388 author = "Peter Naur", 17389 title = "Programming Languages, Natural Languages, and Mathematics", 17390 journal = j-CACM, 17391 volume = "18", 17392 number = "12", 17393 pages = "676--683", 17394 month = dec, 17395 year = "1975", 17396 CODEN = "CACMA2", 17397 ISSN = "0001-0782", 17398 MRclass = "68A05 (68A30)", 17399 MRnumber = "56 13752", 17400 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17401 bibsource = "Compendex database", 17402 note = "Papers from the Second {ACM} Symposium on Principles of Programming Languages (Palo Alto, Calif., 1975).", 17403 abstract = "Some social aspects of programming are illuminated through analogies with similar aspects of mathematics and natural languages. The split between pure and applied mathematics is found similarly in programming. The development of natural languages toward flexionless, word-order based language types speaks for programming language design based on general, abstract constructs. By analogy with incidents of the history of artificial, auxiliary languages it is suggested that Fortran and Cobol will remain dominant for a long time to come. The most promising avenues for further work of wide influence are seen to be high quality program literature (i.e. programs) of general utility and studies of questions related to program style.", 17404 acknowledgement = ack-nhfb, 17405 classcodes = "C6110 (Systems analysis and programming)", 17406 classification = "723", 17407 corpsource = "Datalogisk Inst., Copenhagen Univ., Copenhagen, Denmark", 17408 journalabr = "Commun ACM", 17409 keywords = "abstract constructs; artificial; auxiliary languages; computer programming languages; descriptive and; literature; prescriptive attitudes; programming language; programming languages; pure and applied mathematics; social aspects of automation; social aspects of programming; style", 17410 treatment = "P Practical", 17411} 17412 17413@Article{Goodenough:1975:EHI, 17414 author = "John B. Goodenough", 17415 title = "Exception Handling: Issues and a Proposed Notation", 17416 journal = j-CACM, 17417 volume = "18", 17418 number = "12", 17419 pages = "683--696", 17420 month = dec, 17421 year = "1975", 17422 CODEN = "CACMA2", 17423 ISSN = "0001-0782", 17424 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17425 bibsource = "Compendex database", 17426 abstract = "This paper defines exception conditions, discusses the requirements exception handling language features must satisfy, and proposes some new language features for dealing with exceptions in an orderly and reliable way. The proposed language features serve to highlight exception handling issues by showing how deficiencies in current approaches can be remedied.", 17427 acknowledgement = ack-nhfb, 17428 classcodes = "C6110 (Systems analysis and programming)", 17429 classification = "723", 17430 corpsource = "SofTech Inc., Waltham, MA, USA", 17431 journalabr = "Commun ACM", 17432 keywords = "computer programming languages; conditions; error; exception conditions; exception handling; goto statement; language features; multilevel exit; ON conditions; programming; programming languages; proposed notation; structured programming", 17433 treatment = "P Practical", 17434} 17435 17436@Article{Jazayeri:1975:IEC, 17437 author = "Mehdi Jazayeri and William F. Ogden and William C. Rounds", 17438 title = "The Intrinsically Exponential Complexity of the Circularity Problem for Attribute Grammars", 17439 journal = j-CACM, 17440 volume = "18", 17441 number = "12", 17442 pages = "697--706", 17443 month = dec, 17444 year = "1975", 17445 CODEN = "CACMA2", 17446 ISSN = "0001-0782", 17447 MRclass = "68A20", 17448 MRnumber = "52 16115", 17449 mrreviewer = "I. Hal Sudborough", 17450 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17451 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/AG.bib", 17452 note = "Papers from the Second {ACM} Symposium on Principles of Programming Languages (Palo Alto, Calif., 1975)", 17453 abstract = "Attribute grammars are an extension of context-free grammars devised by Knuth as a mechanism for including the semantics of a context-free language with the syntax of the language. The circularity problem for a grammar is to determine whether the semantics for all possible sentences (programs) in fact will be well defined. It is proved that this problem is, in general, computationally intractable. Specifically, it is shown that any deterministic algorithm which solves the problem must for infinitely many cases use an exponential amount of time. An improved version of Knuth's circularity testing algorithm is also given, which actually solves the problem within exponential time.", 17454 acknowledgement = ack-nhfb, 17455 classcodes = "C4210 (Formal logic); C4240 (Programming and algorithm theory)", 17456 classification = "721; 723", 17457 corpsource = "Univ. of North Carolina, Chapel Hill, NC, USA", 17458 journalabr = "Commun ACM", 17459 keywords = "attribute grammars; automata theory; circ; circularity problem; computational complexity; computer programming languages; context free grammars; context-free grammars; deterministic algorithm; exponential time; intrinsically exponential complexity; semantics", 17460 treatment = "T Theoretical or Mathematical", 17461} 17462 17463@Article{Hunt:1975:CLK, 17464 author = "Harry B. {Hunt, III} and Thomas G. Szymanski and Jeffrey D. Ullman", 17465 title = "On the Complexity of {LR(k)} Testing", 17466 journal = j-CACM, 17467 volume = "18", 17468 number = "12", 17469 pages = "707--716", 17470 month = dec, 17471 year = "1975", 17472 CODEN = "CACMA2", 17473 ISSN = "0001-0782", 17474 MRclass = "68A20 (68A30)", 17475 MRnumber = "52 12402", 17476 mrreviewer = "Pavel Strnad", 17477 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17478 bibsource = "Compendex database", 17479 note = "Papers from the Second ACM Symposium on Principles of Programming Languages (Palo Alto, Calif., 1975).", 17480 abstract = "The problem of determining whether an arbitrary context-free grammar is a member of some easily parsed subclass of grammars such as the LR(k) grammars is considered. The time complexity of this problem is analyzed both when k is considered to be a fixed integer and when k is considered to be a parameter of the test. In the first case, it is shown that for every k there exists an O(n**k** plus **2) algorithm for testing the LR(k) property, where n is the size of the grammar in question. On the other hand, if both k and the subject grammar are problem parameters, then the complexity of the problem depends very strongly on the representation chosen for k. More specifically, it is shown that this problem is NP-complete when k is expressed in unary. When k is expressed in binary the problem is complete for nondeterministic exponential time. These results carry over to many other parameterized classes of grammars, such as the LL(k), strong LL(k), SLR(k), and strong LC(k) grammars.", 17481 acknowledgement = ack-nhfb, 17482 classcodes = "C4210 (Formal logic); C4240 (Programming and algorithm theory)", 17483 classification = "721; 723", 17484 corpsource = "Harvard Univ., Cambridge, MA, USA", 17485 journalabr = "Commun ACM", 17486 keywords = "automata theory; computer programming languages", 17487 keywords = "computational complexity; context free grammar; context-free grammars; LR(k) grammars; nondeterministic exponential time; NP complete; parsing; problems; time complexity", 17488 treatment = "T Theoretical or Mathematical", 17489} 17490 17491@Article{Graham:1975:FUL, 17492 author = "Susan L. Graham and Mark Wegman", 17493 title = "A fast and usually linear algorithm for global flow analysis", 17494 journal = j-CACM, 17495 volume = "18", 17496 number = "12", 17497 pages = "716--716", 17498 month = dec, 17499 year = "1975", 17500 CODEN = "CACMA2", 17501 ISSN = "0001-0782", 17502 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17503 note = "See \cite{Graham:1976:FUL} for full paper.", 17504 abstract = "A new algorithm for global flow analysis on reducible graphs is presented. The algorithm is shown to treat a very general class of function spaces. \par For a graph of $e$ edges, the algorithm has a worst case time bound of $O(e \log e)$ function operations. \par It is also shown that in programming terms, the number of operations is proportional to $e$ plus the number of exits from program loops. Consequently a restriction to one-entry one-exit control structures linearity. The algorithm can be extended to yet larger classes of function spaces and graphs by relaxing the time bound. Examples are given of code improvement problems which can be solved using the algorithm.", 17505 acknowledgement = ack-nhfb, 17506 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics)", 17507 corpsource = "Univ. of California, Berkeley, CA, USA", 17508 keywords = "bound; code optimisation; code optimization; common; common subexpression elimination; compression; data flow; depth-first search; flow graph; function spaces; global flow analysis; go-to-less programming; graph theory; information propagation; live-dead analysis; path; path compression; reducibility; reducible graphs; subexpression elimination; worst case time", 17509 treatment = "T Theoretical or Mathematical", 17510} 17511 17512@Article{Lipton:1975:RMP, 17513 author = "Richard J. Lipton", 17514 title = "Reduction: {A} Method of Proving Properties of Parallel Programs", 17515 journal = j-CACM, 17516 volume = "18", 17517 number = "12", 17518 pages = "717--721", 17519 month = dec, 17520 year = "1975", 17521 CODEN = "CACMA2", 17522 ISSN = "0001-0782", 17523 MRclass = "68A05", 17524 MRnumber = "53 4599", 17525 mrreviewer = "O. A. Leticevskii", 17526 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17527 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 17528 note = "Papers from the Second {ACM} Symposium on Principles of Programming Languages (Palo Alto, Calif., 1975).", 17529 abstract = "When proving that a parallel program has a given property it is often convenient to assume that a statement is indivisible, i.e. that the statement cannot be interleaved with the rest of the program. Here sufficient conditions are obtained to show that the assumption that a statement is indivisible can be relaxed and still preserve properties such as halting. Thus correctness proofs of a parallel system can often be greatly simplified.", 17530 acknowledgement = ack-nhfb, 17531 classcodes = "C4240 (Programming and algorithm theory)", 17532 classification = "723", 17533 corpsource = "Yale Univ., New Haven, CT, USA", 17534 journalabr = "Commun ACM", 17535 keywords = "computation sequence; computer metatheory; deadlock; free; halting; indivisible; interruptible; parallel processing; parallel programs; process; programming theory; reduction; semaphore; verification method", 17536 treatment = "T Theoretical or Mathematical", 17537} 17538 17539@Article{Schwartz:1975:ADS, 17540 author = "J. T. Schwartz", 17541 title = "Automatic Data Structure Choice in a Language of Very High Level", 17542 journal = j-CACM, 17543 volume = "18", 17544 number = "12", 17545 pages = "722--728", 17546 month = dec, 17547 year = "1975", 17548 CODEN = "CACMA2", 17549 ISSN = "0001-0782", 17550 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17551 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/opt.compiler.bib", 17552 abstract = "SETL is a set-theoretically oriented language of very high level whose repertoire of semantic objects includes finite sets, ordered n-tuples, and sets of ordered n-tuples usable as mappings. This paper describes the structure of an optimizer for this language. Among other methods of interest, the optimizer uses techniques which allow relations of inclusion and membership to be established, the domains and ranges of (tabulated) mappings to be estimated from above and below, and the single-valuedness of (tabulated) mappings to be proved. Once facts of this kind have been established, automatic choice of data structures becomes possible. The methods employed are based upon, and extend, known techniques of data flow analysis.", 17553 acknowledgement = ack-nhfb, 17554 classcodes = "C4240 (Programming and algorithm theory); C6140D (High level languages)", 17555 classification = "723", 17556 corpsource = "New York Univ., New York, NY, USA", 17557 journalabr = "Commun ACM", 17558 keywords = "automatic programming; computer programming languages; data flow analysis; data processing --- Data Structures; data structure choice; data structures; language; mappings; optimisation; program; programming languages; programming theory; set theoretically oriented; SETL", 17559 treatment = "T Theoretical or Mathematical", 17560} 17561 17562@Article{Kleinrock:1976:SLO, 17563 author = "Leonard Kleinrock and William E. Naylor and Holger Opderbeck", 17564 title = "A Study of Line Overhead in the {ARPANET}", 17565 journal = j-CACM, 17566 volume = "19", 17567 number = "1", 17568 pages = "3--13", 17569 month = jan, 17570 year = "1976", 17571 CODEN = "CACMA2", 17572 ISSN = "0001-0782", 17573 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17574 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1976.bib", 17575 abstract = "The form, extent, and effect of the communication line overhead in the ARPANET are considered. The source of this overhead is separated into various levels of protocol hierarchy and the characteristics of each level are summarized. Then the line efficiency for various models of system use is studied. Some measurements of line efficiency for the ARPANET are presented and by extrapolation these measurements are used to anticipate overhead in a heavily loaded network. Similar results are derived for a recently proposed network protocol and compared with those for the current system.", 17576 acknowledgement = ack-nhfb, 17577 annote = "The form, extend, and effect of the communication line overhead in the Arpanet are considered.", 17578 classcodes = "C5620 (Computer networks and techniques)", 17579 classification = "723", 17580 corpsource = "Univ. of California, Los Angeles, CA, USA", 17581 country = "USA", 17582 date = "08/12/80", 17583 descriptors = "ARPANET; packet switching; performance evaluation; OVERHEAD;", 17584 enum = "1703", 17585 journalabr = "Commun ACM", 17586 keywords = "ARPANET; communication line; computer networks; computer systems, digital --- Time Sharing; computers; heavily loaded network; hierarchy; line efficiency; line overhead; protocol", 17587 language = "English", 17588 references = "23", 17589 treatment = "P Practical", 17590} 17591 17592@Article{Wilhelm:1976:ADS, 17593 author = "Neil C. Wilhelm", 17594 title = "An Anomaly in Disk Scheduling: {A} Comparison of {FCFS} and {SSTF} Seek Scheduling Using an Empirical Model for Disk Accesses", 17595 journal = j-CACM, 17596 volume = "19", 17597 number = "1", 17598 pages = "13--18 (or 13--17??)", 17599 month = jan, 17600 year = "1976", 17601 CODEN = "CACMA2", 17602 ISSN = "0001-0782", 17603 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17604 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17605 abstract = "A model for disk accesses based on published measurements is developed. The model is used to show that under highly probable conditions, FCFS seek scheduling is superior to SSTF scheduling in the sense of having a lower mean queue length. A simple example of an arrival sequence illustrating this anomaly is presented.", 17606 acknowledgement = ack-nhfb, 17607 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 17608 classification = "721; 722", 17609 corpsource = "Univ. of Rochester, Rochester, NY, USA", 17610 journalabr = "Commun ACM", 17611 keywords = "(computers); comparison; data storage, magnetic; disc accesses; disc scheduling; empirical model; FCFS; magnetic disc and drum storage; operating systems; seek scheduling; SSTF", 17612 treatment = "P Practical", 17613} 17614 17615@Article{Agnew:1976:QAR, 17616 author = "Carson E. Agnew", 17617 title = "On Quadratic Adaptive Routing Algorithms", 17618 journal = j-CACM, 17619 volume = "19", 17620 number = "1", 17621 pages = "18--22", 17622 month = jan, 17623 year = "1976", 17624 CODEN = "CACMA2", 17625 ISSN = "0001-0782", 17626 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17627 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1976.bib", 17628 abstract = "Two analytic models of a store-and-forward communications network are constructed, one to find the optimal message routing and the other to illustrate the equilibrium (stationary state) maintained by an adaptive routing algorithm. These models show that adaptive routing does not satisfy the necessary conditions for an optimal routing. Adaptive routing tends to overuse the direct path and underuse alternate routes because it does not consider the impact of its current routing decision on the future state of the network. The form of the optimality conditions suggests that a modification of the adaptive algorithm will result in optimality. The modification requires the substitution of a quadratic bias term instead of a linear one in the routing table maintained at each network node. Simulation results are presented which confirm the theoretical analysis for a simple network.", 17629 acknowledgement = ack-nhfb, 17630 annote = "Two analytic models of a store-and-forward communications network are constructed, one to find the optimal message routing and the other to illustrate the equilibrium maintained by an adaptive routing algorithm. These models show that adaptive routing does not satisfy the necessary conditions for an optimal routing. Adaptive routing tends to overuse the direct path and underuse alternate routes because it does not consider the impact of the ro", 17631 classcodes = "B6210Z (Other data transmission); C5600 (Data communication equipment and techniques)", 17632 classification = "723", 17633 corpsource = "Stanford Univ., Stanford, CA, USA", 17634 country = "USA", 17635 descriptors = "Routing algorithm; adaptive routing; quadratic routing; alternate routing; store-and-forward; computer network; distributed computing system; message switching;", 17636 enum = "37", 17637 journalabr = "Commun ACM", 17638 keywords = "adaptive routing; algorithms; alternate routing; communications network; computer network; computer programming; digital communication systems; distributed network; equilibrium; forward; message switching; optimal message; quadratic adaptive routing; quadratic routing; routing; routing algorithms; store-and-forward network", 17639 language = "English", 17640 references = "0", 17641 treatment = "A Application; T Theoretical or Mathematical", 17642} 17643 17644@Article{Karlton:1976:PHB, 17645 author = "P. L. Karlton and S. H. Fuller and R. E. Scroggs and E. B. Kaehler", 17646 title = "Performance of Height-Balanced Trees", 17647 journal = j-CACM, 17648 volume = "19", 17649 number = "1", 17650 pages = "23--28", 17651 month = jan, 17652 year = "1976", 17653 CODEN = "CACMA2", 17654 ISSN = "0001-0782", 17655 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17656 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17657 abstract = "This paper presents the results of simulations that investigate the performance of height-balanced (HB left bracket k right bracket ) trees. It is shown that the only statistic of HB left bracket 1 right bracket trees (AVL trees) that is a function of the size of the tree is the time to search for an item in the tree. For sufficiently large trees, the execution times of all procedures for maintaining HB left bracket 1 right bracket trees are independent of the size of the tree.", 17658 acknowledgement = ack-nhfb, 17659 annote = "Binary tree balancing when inserting and deleting.", 17660 classcodes = "C4290 (Other computer theory); C6120 (File organisation)", 17661 classification = "723; 921", 17662 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 17663 journalabr = "Commun ACM", 17664 keywords = "deletion; execution times; file organisation; height balanced trees; performance; search; traceback; trees (mathematics)", 17665 keywords = "information retrieval systems; mathematical techniques", 17666 treatment = "A Application; T Theoretical or Mathematical", 17667} 17668 17669@Article{Florentin:1976:IRC, 17670 author = "J. J. Florentin", 17671 title = "Information Reference Coding", 17672 journal = j-CACM, 17673 volume = "19", 17674 number = "1", 17675 pages = "29--33", 17676 month = jan, 17677 year = "1976", 17678 CODEN = "CACMA2", 17679 ISSN = "0001-0782", 17680 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17681 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17682 abstract = "Items in business systems have to be identified by reference codes, which can later be used as data codes and file keys in an associated data processing system. In business systems associated with large collections of integrated files (databases) it is vital to assign codes in a methodical way so as to control future extension and changes while maintaining correct program action. The principles of methodical coding are discussed, and the way in which logical connections between data items must be reflected in the reference code framework is shown through a set-theoretic information model.", 17683 acknowledgement = ack-nhfb, 17684 annote = "Codes to denote associative tuples.", 17685 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 17686 classification = "723", 17687 corpsource = "Birkbeck Coll., Univ. of London, London, UK", 17688 journalabr = "Commun ACM", 17689 keywords = "business systems; data codes; data handling; data processing system; data processing, business; databases; file keys; file organisation; information model; integrated files; logical connections; methodical coding; reference codes", 17690 treatment = "P Practical", 17691} 17692 17693@Article{Litecky:1976:SEE, 17694 author = "Charles R. Litecky and Gordon B. Davis", 17695 title = "Study of Errors, Error-Proneness, and Error Diagnosis in {Cobol}", 17696 journal = j-CACM, 17697 volume = "19", 17698 number = "1", 17699 pages = "33--37", 17700 month = jan, 17701 year = "1976", 17702 CODEN = "CACMA2", 17703 ISSN = "0001-0782", 17704 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17705 bibsource = "Compendex database", 17706 abstract = "This paper provides data on Cobol error frequency for correction of errors in student-oriented compilers, improvement of teaching, and changes in programming language. Cobol was studied because of economic importance, widespread usage, possible error-inducing design, and lack of research.", 17707 acknowledgement = ack-nhfb, 17708 classcodes = "C6110 (Systems analysis and programming); C6140D (High level languages); C6150G (Diagnostic, testing, debugging and evaluating systems)", 17709 classification = "723", 17710 corpsource = "Univ. of Wisconsin, Madison, WI, USA", 17711 journalabr = "Commun ACM", 17712 keywords = "COBOL; computer programming languages; error diagnosis; errors; misspellings; program diagnostics; programming", 17713 treatment = "P Practical", 17714} 17715 17716@Article{Knuth:1976:EAB, 17717 author = "Donald E. Knuth", 17718 title = "Errata: {``Ancient Babylonian algorithms''}", 17719 journal = j-CACM, 17720 volume = "19", 17721 number = "2", 17722 month = feb, 17723 year = "1976", 17724 CODEN = "CACMA2", 17725 ISSN = "0001-0782", 17726 MRclass = "108.01A15", 17727 MRnumber = "52 13133", 17728 bibdate = "Tue Dec 26 13:35:07 1995", 17729 note = "See \cite{Knuth:1972:ABA}.", 17730 acknowledgement = ack-nhfb, 17731} 17732 17733@Article{Bochmann:1976:SEL, 17734 author = "Gregor V. Bochmann", 17735 title = "Semantic Evaluation from Left to Right", 17736 journal = j-CACM, 17737 volume = "19", 17738 number = "2", 17739 pages = "55--62", 17740 month = feb, 17741 year = "1976", 17742 CODEN = "CACMA2", 17743 ISSN = "0001-0782", 17744 MRclass = "68A30", 17745 MRnumber = "55 13879", 17746 mrreviewer = "V. N. Agafonov", 17747 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17748 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/AG.bib; ftp://ftp.ira.uka.de/pub/bibliography/Database/dbase.bib", 17749 abstract = "This paper describes attribute grammars and their use for the definition of programming languages and compilers; a formal definition of attribute grammars and a discussion of some of its important aspects are included. The paper concentrates on the evaluation of semantic attributes in a few passes from left to right over the derivation tree of a program. A condition for an attribute grammar is given which assures that the semantics of any program can be evaluated in a single pass over the derivation tree, and an algorithm is discussed which decides how many passes from left to right are in general necessary, given the attribute grammar. These notions are explained in terms of an example grammar which describes the scope rules of Algol 60. Practical questions, such as the relative efficiency of different evaluation schemes, and the ease of adapting the attribute grammar of a given programming language to the left-to-right evaluation scheme are discussed.", 17750 acknowledgement = ack-nhfb, 17751 classcodes = "C4210 (Formal logic)", 17752 classification = "723", 17753 corpsource = "Univ. of Montreal, Montreal, Que., Canada", 17754 journalabr = "Commun ACM", 17755 keywords = "Algol 60; attribute grammars; compilers; computer programming languages; context free grammar; context-free grammars; context-free languages; derivation tree; eval class; left to right; multipass; programming languages; semantic attributes", 17756 treatment = "T Theoretical or Mathematical", 17757} 17758 17759@Article{Rivest:1976:SOS, 17760 author = "Ronald L. Rivest", 17761 title = "On Self-Organizing Sequential Search Heuristics", 17762 journal = j-CACM, 17763 volume = "19", 17764 number = "2", 17765 pages = "63--67", 17766 month = feb, 17767 year = "1976", 17768 CODEN = "CACMA2", 17769 ISSN = "0001-0782", 17770 MRclass = "68A10 (68A20)", 17771 MRnumber = "53 12068", 17772 mrreviewer = "Robert Wagner", 17773 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17774 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17775 abstract = "This paper examines a class of heuristics for maintaining a sequential list in approximately optimal order with respect to the average time required to search for a specified element, assuming that each element is searched for with a fixed probability independent of previous searches performed. The ``move to front'' and ``transposition'' heuristics are shown to be optimal to within a constant factor, and the transposition rule is shown to be the more efficient of the two. Empirical evidence suggests that transposition is in fact optimal for any distribution of search probabilities.", 17776 acknowledgement = ack-nhfb, 17777 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics); C6120 (File organisation); C6130 (Data handling techniques)", 17778 classification = "723; 922", 17779 corpsource = "MIT, Cambridge, MA, USA", 17780 journalabr = "Commun ACM", 17781 keywords = "computer systems programming; probability", 17782 keywords = "combinatorial mathematics; list processing; rule; self organising; sequential search heuristics; sorting; transposition", 17783 treatment = "T Theoretical or Mathematical", 17784} 17785 17786@Article{Ives:1976:PEF, 17787 author = "F. M. Ives", 17788 title = "Permutation Enumeration: Four New Permutation Algorithms", 17789 journal = j-CACM, 17790 volume = "19", 17791 number = "2", 17792 pages = "68--72", 17793 month = feb, 17794 year = "1976", 17795 CODEN = "CACMA2", 17796 ISSN = "0001-0782", 17797 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17798 bibsource = "Compendex database", 17799 abstract = "Classical permutation enumeration algorithms encounter special cases requiring additional computation every nth permutation when generating the n! permutations on n marks. Four new algorithms have the attribute that special cases occur every n(n minus 1) permutations. Two of the algorithms produce the next permutation with a single exchange of two marks. The other two algorithms infrequently exchange more than two marks, but the rules for generating the next permutation are very simple. Performance tests which have counted execution of assignment statements, comparisons, arithmetic operations, and subscripted array references have shown superiority of the new algorithms compared to Boothroyd's implementation of M. B. Wells' algorithm and Erlich's implementation of the Johnson-Trotter algorithm.", 17800 acknowledgement = ack-nhfb, 17801 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics)", 17802 classification = "723", 17803 corpsource = "Western Washington State Coll., Bellingham, WA, USA", 17804 journalabr = "Commun ACM", 17805 keywords = "combinatorial mathematics; computer programming; enumeration; loop free algorithms; permutation", 17806 treatment = "A Application; T Theoretical or Mathematical", 17807} 17808 17809@Article{Martelli:1976:AHS, 17810 author = "Alberto Martelli", 17811 title = "Application of Heuristic Search Methods to Edge and Contour Detection", 17812 journal = j-CACM, 17813 volume = "19", 17814 number = "2", 17815 pages = "73--83", 17816 month = feb, 17817 year = "1976", 17818 CODEN = "CACMA2", 17819 ISSN = "0001-0782", 17820 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17821 bibsource = "Compendex database", 17822 abstract = "This paper presents a method for detecting edges and contours in noisy pictures. The properties of an edge are embedded in a figure of merit and the edge detection problem becomes the problem of minimizing the given figure of merit. This problem can be represented as a shortest path problem on a graph and can be solved using well-known graph search algorithms. The relations between this representation of the minimization problem and a dynamic programming approach are discussed, showing that the graph search method can lead to substantial improvements in computing time. Moreover, if heuristic search methods are used, the computing time will depend on the amount of noise in the picture. Some experimental results are given; these show how various information about the shape of the contour of an object can be embedded in the figure of merit, thus allowing the extraction of contours from noisy pictures and the separation of touching objects.", 17823 acknowledgement = ack-nhfb, 17824 classcodes = "B0260 (Optimisation techniques); B6140C (Optical information, image and video signal processing); C1180 (Optimisation techniques); C1230 (Artificial intelligence); C1250 (Pattern recognition); C5530 (Pattern recognition and computer vision equipment); C7490 (Computing in other engineering fields)", 17825 classification = "723; 921", 17826 corpsource = "Istituto di Elaborazione della Informazione Consiglio Nazionale delle Ricerche, Piza, Italy", 17827 journalabr = "Commun ACM", 17828 keywords = "contours; dynamic programming; edge and contour detection; extraction of; heuristic programming; heuristic search; image processing; mathematical programming, dynamic; noisy; pattern; pattern recognition; pattern recognition systems; picture processing; pictures; problem; recognition; shortest path; solving", 17829 treatment = "A Application; T Theoretical or Mathematical", 17830} 17831 17832@Article{Siler:1976:SEM, 17833 author = "Kenneth F. Siler", 17834 title = "A Stochastic Evaluation Model for Database Organizations in Data Retrieval Systems", 17835 journal = j-CACM, 17836 volume = "19", 17837 number = "2", 17838 pages = "84--95", 17839 month = feb, 17840 year = "1976", 17841 CODEN = "CACMA2", 17842 ISSN = "0001-0782", 17843 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17844 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 17845 abstract = "This paper discusses a simulation model of a data retrieval system which has the effect of significantly reducing the cost of experimentation and enabling research never attempted before. The model is designed to estimate the retrieval workload of alternative data retrieval systems. These data retrieval systems can be organized under several database organizations, including inverted list, threaded list, and cellular list organizations and hybrid combinations of these systems. Effectiveness of the methodology is demonstrated by using the model to study the effect of database organizations in data retrieval systems.", 17846 acknowledgement = ack-nhfb, 17847 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 17848 classification = "723; 922", 17849 corpsource = "Univ. of California, Los Angeles, CA, USA", 17850 journalabr = "Commun ACM", 17851 keywords = "cellular list; data processing; data retrieval systems; database management systems; database organisations; information retrieval systems; inverted list; list; mathematical models; physical database design; simulation; stochastic evaluation model; stochastic processes; threaded", 17852 treatment = "P Practical", 17853} 17854 17855@Article{Fagin:1976:CEC, 17856 author = "Ronald Fagin", 17857 title = "A Counterintuitive Example of Computer Paging", 17858 journal = j-CACM, 17859 volume = "19", 17860 number = "2", 17861 pages = "96--97", 17862 month = feb, 17863 year = "1976", 17864 CODEN = "CACMA2", 17865 ISSN = "0001-0782", 17866 MRclass = "68A50", 17867 MRnumber = "55 7000a", 17868 mrreviewer = "W. Kwasowiec", 17869 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17870 bibsource = "Compendex database", 17871 note = "See corrigendum \cite{Fagin:1976:CCE}.", 17872 abstract = "A counterexample is exhibited to a natural conjecture concerning the optimal way to group records into pages in the independent reference model of computer paging (an organization is said to be optimal if the ``least recently used'' miss ratio is minimized).", 17873 acknowledgement = ack-nhfb, 17874 classcodes = "C6120 (File organisation)", 17875 classification = "723", 17876 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 17877 journalabr = "Commun ACM", 17878 keywords = "allocation; computer operating systems; computer paging; independent reference model; least recently; most likely together; record; storage organisation; used; virtual storage", 17879 treatment = "P Practical", 17880} 17881 17882@Article{Artzy:1976:FDT, 17883 author = "Ehud Artzy and James A. Hinds and Harry J. Saal", 17884 title = "A Fast Division Technique for Constant Divisors", 17885 journal = j-CACM, 17886 volume = "19", 17887 number = "2", 17888 pages = "98--101", 17889 month = feb, 17890 year = "1976", 17891 CODEN = "CACMA2", 17892 ISSN = "0001-0782", 17893 MRclass = "68A10 (10A10)", 17894 MRnumber = "54 1707", 17895 mrreviewer = "C. F. Kelemen", 17896 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17897 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib", 17898 abstract = "A fast algorithm for division by constant divisors is presented. The method has proved very useful implemented as microcode on a binary machine, and can be adapted directly into hardware. The mathematical foundations of the algorithm are presented as well as some performance measures.", 17899 acknowledgement = ack-nhfb, 17900 classcodes = "C5230 (Digital arithmetic methods)", 17901 classification = "723", 17902 corpsource = "State Univ. of New York, Buffalo, NY, USA", 17903 journalabr = "Commun ACM", 17904 keywords = "bit addressable memory; computer programming; constant divisors; digital arithmetic; fast division; microprogram", 17905 treatment = "A Application; T Theoretical or Mathematical", 17906} 17907 17908@Article{Newell:1976:CSE, 17909 author = "Allen Newell and Herbert A. Simon", 17910 title = "Computer Science as Empirical Inquiry: Symbols and Search", 17911 journal = j-CACM, 17912 volume = "19", 17913 number = "3", 17914 pages = "113--126", 17915 month = mar, 17916 year = "1976", 17917 CODEN = "CACMA2", 17918 ISSN = "0001-0782", 17919 MRclass = "68-01", 17920 MRnumber = "57 4555", 17921 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17922 acknowledgement = ack-nhfb, 17923 classcodes = "C1230 (Artificial intelligence); C6130 (Data handling techniques)", 17924 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 17925 keywords = "artificial intelligence; cognition; computer science; empirical inquiry; heuristic programming; heuristic search; list; list processing; physical symbol systems; problem solving; processing; symbols; Turing", 17926 treatment = "A Application; P Practical", 17927} 17928 17929@Article{Babad:1976:JPM, 17930 author = "Jair M. Babad and Mario M. Modiano", 17931 title = "Joining Policies in a Multipriority Multiclass Batch Computer System", 17932 journal = j-CACM, 17933 volume = "19", 17934 number = "3", 17935 pages = "127--136", 17936 month = mar, 17937 year = "1976", 17938 CODEN = "CACMA2", 17939 ISSN = "0001-0782", 17940 MRclass = "90B35 (68A99)", 17941 MRnumber = "53 7429", 17942 mrreviewer = "Erol Gelenbe", 17943 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17944 bibsource = "Compendex database", 17945 abstract = "A multipriority batch computer system which users from several different classes may join, with toll, service, and waiting charges is formulated here as a semi-Markov decision process, in which the aim of arriving users is to minimize their expected loss. The optimal joining policy of arriving users who may join the system at some of its queues is a control limit policy, with a single control number for any possible queue and the user's class; a newly arriving user will join a queue that is not filled up to the control number corresponding to this queue and the user's class. In this paper control numbers, as well as lower and upper bounds for the control numbers and the capacities of the system's queues are derived.", 17946 acknowledgement = ack-nhfb, 17947 classcodes = "C6150J (Operating systems)", 17948 classification = "723; 922", 17949 corpsource = "Univ. of Chicago, Chicago, IL, USA", 17950 journalabr = "Commun ACM", 17951 keywords = "batch processing (computers); control number; data processing; Markov processes; multipriority batch computer system; operating system; operations; operations research; optimal joining policy; price; priority queues; probability --- Queueing Theory; research; scheduling; semi Markow process", 17952 treatment = "P Practical", 17953} 17954 17955@Article{Allen:1976:PDF, 17956 author = "F. E. Allen and J. Cocke", 17957 title = "A Program Data Flow Analysis Procedure", 17958 journal = j-CACM, 17959 volume = "19", 17960 number = "3", 17961 pages = "137--147 (or 137--146??)", 17962 month = mar, 17963 year = "1976", 17964 CODEN = "CACMA2", 17965 ISSN = "0001-0782", 17966 bibdate = "Tue Mar 25 13:26:09 MST 1997", 17967 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 17968 abstract = "The global data relationships in a program can be exposed and codified by the static analysis methods described in this paper. A procedure is given which determines all the definitions which can possibly ``reach'' each mode of the control flow graph of the program and all the definitions that are ``live'' on each edge of the graph. The procedure uses an ``interval'' ordered edge listing data structure and handles reducible and irreducible graphs indistinguishably.", 17969 acknowledgement = ack-nhfb, 17970 classcodes = "C4240 (Programming and algorithm theory)", 17971 classification = "723", 17972 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 17973 journalabr = "Commun ACM", 17974 keywords = "compilers; data flow analysis; data processing; edge listing data; flow graphs; optimisation; program optimisation; programming theory; static analysis; structure", 17975 treatment = "A Application; T Theoretical or Mathematical", 17976} 17977 17978@Article{Minski:1976:IRP, 17979 author = "Naftaly Minski", 17980 title = "Intentional Resolution of Privacy Protection in Database Systems", 17981 journal = j-CACM, 17982 volume = "19", 17983 number = "3", 17984 pages = "148--159", 17985 month = mar, 17986 year = "1976", 17987 CODEN = "CACMA2", 17988 ISSN = "0001-0782", 17989 bibdate = "Sat Jan 18 15:28:23 1997", 17990 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 17991 abstract = "This paper is concerned with the control over what a user is allowed to do with a piece of information supplied to him by the database. The ability to condition the supply of information on its intended use is called here ``intentional resolution'' of privacy protection. The practical importance of intentional resolution is demonstrated by several examples, and its realization is discussed. It appears to be necessary for the database to impose a certain amount of control over the internal behavior of users' programs which interact with it. A model for user-database interaction which admits such a control is developed.", 17992 acknowledgement = ack-nhfb, 17993 classification = "723", 17994 journalabr = "Commun ACM", 17995 keywords = "data processing", 17996} 17997 17998@Article{Naftaly:1976:IRP, 17999 author = "M. Naftaly", 18000 title = "Intentional resolution of privacy protection in database systems", 18001 journal = j-CACM, 18002 volume = "19", 18003 number = "3", 18004 pages = "148--159", 18005 month = mar, 18006 year = "1976", 18007 CODEN = "CACMA2", 18008 ISSN = "0001-0782", 18009 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18010 acknowledgement = ack-nhfb, 18011 classcodes = "C0200 (General computer topics); C6120 (File organisation); C7100 (Business and administration)", 18012 corpsource = "Rutgers Univ., New Brunswick, NJ, USA", 18013 keywords = "data base systems; database management systems; intentional; interaction with databases; privacy protection; protection in programming languages; resolution; security; security of data", 18014 treatment = "P Practical", 18015} 18016 18017@Article{Smoot:1976:DIS, 18018 author = "O. R. Smoot", 18019 title = "Development of an international system for legal protection of computer programs", 18020 journal = j-CACM, 18021 volume = "19", 18022 number = "4", 18023 pages = "171--174", 18024 month = apr, 18025 year = "1976", 18026 CODEN = "CACMA2", 18027 ISSN = "0001-0782", 18028 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18029 acknowledgement = ack-nhfb, 18030 classcodes = "C0200 (General computer topics)", 18031 corpsource = "Computer and Business Equipment Mfg. Assoc., Washington, DC, USA", 18032 keywords = "computer programs; informal report; international system; legal protection; legislation; market data; security of data; software protection; technological predictions", 18033 treatment = "G General Review; P Practical", 18034} 18035 18036@Article{Lientz:1976:CEV, 18037 author = "Bennet P. Lientz", 18038 title = "A comparative evaluation of versions of {BASIC}", 18039 journal = j-CACM, 18040 volume = "19", 18041 number = "4", 18042 pages = "175--181", 18043 month = apr, 18044 year = "1976", 18045 CODEN = "CACMA2", 18046 ISSN = "0001-0782", 18047 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18048 bibsource = "Compendex database", 18049 abstract = "From its inception, the BASIC language has grown in terms of its usage, scope of usage, and its features. This article compares ten of the current versions of BASIC with each other, with two earlier versions, and with the proposed standard for minimal BASIC. The comparison is arranged by the features of the versions and by computational comparison of computation and times and processing costs.", 18050 acknowledgement = ack-nhfb, 18051 classcodes = "C6140D (High level languages); C6150G (Diagnostic, testing, debugging and evaluating systems)", 18052 classification = "723", 18053 corpsource = "Univ. of California, Los Angeles, CA, USA", 18054 journalabr = "Commun ACM", 18055 keywords = "BASIC; computer programming languages; interpretive language summary", 18056 treatment = "P Practical", 18057} 18058 18059@Article{Raymond:1976:LLA, 18060 author = "J. Raymond", 18061 title = "{LG}: {A} language for analytic geometry", 18062 journal = j-CACM, 18063 volume = "19", 18064 number = "4", 18065 pages = "182--187", 18066 month = apr, 18067 year = "1976", 18068 CODEN = "CACMA2", 18069 ISSN = "0001-0782", 18070 MRclass = "50-04 50D15 68A05", 18071 MRnumber = "57 7341", 18072 mrreviewer = "Wolfgang Bohm", 18073 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18074 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.76.bib", 18075 abstract = "A conversational programming language for analytic geometry is described, together with some aspects of its implementation. The language allows the flexible definition of geometric objects and elements, computes their parameters, and displays the results. It also provides the capability of specifying a geometric figure via a collection of parameters and displaying various loci corresponding to these parameters. A third characteristic consists of the possibility of using this language to design other user oriented languages. LG has been specifically designed for use by nonprogrammers; it is easy to learn and very close to the natural language used in geometry.", 18076 acknowledgement = ack-nhfb, 18077 classcodes = "C5540 (Terminals and graphic displays); C6140D (High level languages)", 18078 classification = "723", 18079 corpsource = "Univ. of Ottawa, Ottawa, Ont., Canada", 18080 journalabr = "Commun ACM", 18081 keywords = "analytic geometry; computer; computer graphics; computer programming languages; conventional programming language; geometry; graphics; interactive programming; LG; problem oriented language; problem oriented languages", 18082 treatment = "P Practical", 18083} 18084 18085@Article{Fagin:1976:CCE, 18086 author = "Ronald Fagin", 18087 title = "Corrigendum: {``A Counterintuitive Example of Computer Paging''}", 18088 journal = j-CACM, 18089 volume = "19", 18090 number = "4", 18091 pages = "187", 18092 month = apr, 18093 year = "1976", 18094 CODEN = "CACMA2", 18095 ISSN = "0001-0782", 18096 MRclass = "68A50", 18097 MRnumber = "55 7000b", 18098 mrreviewer = "W. Kwasowiec", 18099 bibdate = "Tue Dec 26 13:35:07 1995", 18100 note = "See \cite{Fagin:1976:CEC}.", 18101 acknowledgement = ack-nhfb, 18102} 18103 18104@Article{Katz:1976:LAP, 18105 author = "Shmuel Katz and Zohar Manna", 18106 title = "Logical Analysis of Programs", 18107 journal = j-CACM, 18108 volume = "19", 18109 number = "4", 18110 pages = "188--206", 18111 month = apr, 18112 year = "1976", 18113 CODEN = "CACMA2", 18114 ISSN = "0001-0782", 18115 MRclass = "68A05", 18116 MRnumber = "56 17183", 18117 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18118 bibsource = "Compendex database", 18119 abstract = "Most present systems for verification of computer programs are incomplete in that intermediate inductive assertions must be provided manually by the user, termination is not proven, and incorrect programs are not treated. As a unified solution to these problems, this paper suggests conducting a logical analysis of programs by using invariants which express what is actually occurring in the program. Techniques for the automatic generation of invariants are examined. Criteria for using the invariants to check simultaneously for correctness (including termination) or incorrectness are provided. Implications of the approach for the automatic diagnosis and correction of logical errors are discussed.", 18120 acknowledgement = ack-nhfb, 18121 classcodes = "C6150G (Diagnostic, testing, debugging and evaluating systems)", 18122 classification = "723; 921", 18123 corpsource = "Weizmann Inst. of Sci., Rehovoth, Israel", 18124 journalabr = "Commun ACM", 18125 keywords = "automatic diagnosis; computer programming languages; correctness; incorrectness; invariants; logical analysis; mathematical techniques; program debugging; program testing; program verification", 18126 treatment = "P Practical", 18127} 18128 18129@Article{Denning:1976:LMS, 18130 author = "Dorothy E. Denning", 18131 title = "A Lattice Model of Secure Information Flow", 18132 journal = j-CACM, 18133 volume = "19", 18134 number = "5", 18135 pages = "236--243", 18136 month = may, 18137 year = "1976", 18138 CODEN = "CACMA2", 18139 ISSN = "0001-0782", 18140 MRclass = "68A25", 18141 MRnumber = "55 1821", 18142 mrreviewer = "George I. Davida", 18143 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18144 bibsource = "Compendex database", 18145 note = "Papers from the Fifth ACM Symposium on Operating Systems Principles (Univ. Texas, Austin, Tex., 1975).", 18146 abstract = "Mechanisms that guarantee secure information flow in a computer system are discussed. These mechanisms are examined within a mathematical framework suitable for formulating the requirements of secure information flow among security classes. The central component of the model is a lattice structure derived from the security classes and justified by the semantics of information flow. The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches. It also leads to the construction of automatic program certification mechanisms for verifying the secure flow of information through a program.", 18147 acknowledgement = ack-nhfb, 18148 classcodes = "C0200 (General computer topics); C6120 (File organisation); C6150J (Operating systems)", 18149 classification = "722; 723", 18150 corpsource = "Purdue Univ., Lafayette, IN, USA", 18151 journalabr = "Commun ACM", 18152 keywords = "computer operating systems; data processing; lattice; mathematical models; program certification; secure information flow; security; security classes; security of data", 18153 treatment = "A Application; T Theoretical or Mathematical", 18154} 18155 18156@Article{Millen:1976:SKV, 18157 author = "Jonathan K. Millen", 18158 title = "Security Kernel Validation in Practice", 18159 journal = j-CACM, 18160 volume = "19", 18161 number = "5", 18162 pages = "243--250", 18163 month = may, 18164 year = "1976", 18165 CODEN = "CACMA2", 18166 ISSN = "0001-0782", 18167 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18168 bibsource = "Compendex database", 18169 abstract = "A security kernel is a software and hardware mechanism that enforces access controls within a computer system. The correctness of a security kernel on a PDP-11\slash 45 is being proved. This paper describes the technique used to carry out the first step of the proof: validating a formal specification of the program with respect to axioms for a secure system. Application of the kernel will be in providing normally responsive multiprogrammed or time-shared service to computer system users, while restricting access to data to those users with permission for it.", 18170 acknowledgement = ack-nhfb, 18171 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 18172 classification = "722; 723", 18173 corpsource = "MITRE Corp., Bedford, MA, USA", 18174 journalabr = "Commun ACM", 18175 keywords = "computer operating systems; computer systems, digital --- Time Sharing; correctness; data processing; formal specification; operating systems (computers); protection; security kernel; security of data; validation; verification", 18176 treatment = "P Practical", 18177} 18178 18179@Article{Lampson:1976:ROS, 18180 author = "Butler W. Lampson and Howard E. Sturgis", 18181 title = "Reflections on an Operating System Design", 18182 journal = j-CACM, 18183 volume = "19", 18184 number = "5", 18185 pages = "251--265", 18186 month = may, 18187 year = "1976", 18188 CODEN = "CACMA2", 18189 ISSN = "0001-0782", 18190 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18191 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib", 18192 abstract = "The main features of a general purpose multiaccess operating system developed for the CDC 6400 at Berkeley are presented, and its good and bad points are discussed as they appear in retrospect. Distinctive features of the design were the use of capabilities for protection, and the organization of the system into a sequence of layers, each building on the facilities provided by earlier ones and protecting itself from the malfunctions of later ones. There were serious problems in maintaining the protection between layers when levels were added to the memory hierarchy. These problems are discussed and a new solution is described.", 18193 acknowledgement = ack-nhfb, 18194 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 18195 classification = "723", 18196 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 18197 journalabr = "Commun ACM", 18198 keywords = "capabilities; CDC 6400; computer operating systems; faults; hierarchy; layering domains; memory; memory hierarchy; operating system; operating systems (computers); protection; security of data; sharing programs; time-", 18199 treatment = "P Practical", 18200} 18201 18202@Article{Habermann:1976:MHF, 18203 author = "A. N. Habermann and Lawrence Flon and Lee Cooprider", 18204 title = "Modularization and Hierarchy in a Family of Operating Systems", 18205 journal = j-CACM, 18206 volume = "19", 18207 number = "5", 18208 pages = "266--272", 18209 month = may, 18210 year = "1976", 18211 CODEN = "CACMA2", 18212 ISSN = "0001-0782", 18213 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18214 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib", 18215 abstract = "This paper describes the design philosophy used in the construction of a family of operating systems. Fundamental to the design are the concepts of level and module. Further, the system design is structured hierarchically based upon functions. Family members can share much of the software as a result of the implementation of run-time modules at the lowest system level. The system is expected to produce several family members --- including batch and timesharing system --- with widely differing storage management strategies.", 18216 acknowledgement = ack-nhfb, 18217 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 18218 classification = "723", 18219 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 18220 journalabr = "Commun ACM", 18221 keywords = "address space; computer operating systems; data; incremental machine design; module; operating systems; operating systems (computers); type; virtual memory; virtual storage", 18222 treatment = "P Practical", 18223} 18224 18225@Article{Howard:1976:PM, 18226 author = "John H. Howard", 18227 title = "Proving Monitors", 18228 journal = j-CACM, 18229 volume = "19", 18230 number = "5", 18231 pages = "273--279 (or 273--278??)", 18232 month = may, 18233 year = "1976", 18234 CODEN = "CACMA2", 18235 ISSN = "0001-0782", 18236 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18237 bibsource = "Compendex database", 18238 abstract = "Monitors are devices for defining shared abstract objects in a multiprogramming system and for scheduling access to them. It is shown that scheduling and sequential properties of monitors can be proved by using state variables which record the monitors' history and by defining extended proof rules for their wait and signal operations. These two techniques are defined, discussed, and applied to examples to prove properties such as freedom from indefinitely repeated overtaking or unnecessary waiting, upper bounds on queue lengths, and historical behavior.", 18239 acknowledgement = ack-nhfb, 18240 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 18241 classification = "723", 18242 corpsource = "Univ. of Texas, Austin, TX, USA", 18243 journalabr = "Commun ACM", 18244 keywords = "alarm; bounded buffer; clocks; computer metatheory; computer operating systems; computer systems programming --- Multiprogramming; concurrency; correctness; disc head; historical; monitors; multiprogramming; operating systems (computers); proof rules; scheduling; semaphores; variables", 18245 treatment = "P Practical", 18246} 18247 18248@Article{Owicki:1976:VPP, 18249 author = "Susan Owicki and David Gries", 18250 title = "Verifying Properties of Parallel Programs: An Axiomatic Approach", 18251 journal = j-CACM, 18252 volume = "19", 18253 number = "5", 18254 pages = "279--285", 18255 month = may, 18256 year = "1976", 18257 CODEN = "CACMA2", 18258 ISSN = "0001-0782", 18259 MRclass = "68A05 (68A40)", 18260 MRnumber = "55 6925", 18261 mrreviewer = "Derek C. Oppen", 18262 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18263 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 18264 note = "Papers from the {Fifth {ACM} Symposium on Operating Systems Principles (Univ. Texas, Austin, Tex., 1975)}.", 18265 abstract = "An axiomatic method for proving a number of properties of parallel programs is presented. A deductive system which is in some sense complete for partial correctness is defined. A crucial axiom provides for the use of auxiliary variables, which are added to a parallel program as an aid to proving it correct. The information in a partial correctness proof can be used to prove such properties as mutual exclusion, freedom from deadlock, and program termination. Techniques for verifying these properties are presented and illustrated by application to the dining philosophers problem. The language and axioms offered give guides for the construction of correct and comprehensible programs.", 18266 acknowledgement = ack-nhfb, 18267 classcodes = "C6150G (Diagnostic, testing, debugging and evaluating systems); C6150J (Operating systems)", 18268 classification = "723", 18269 corpsource = "Computer Sci. Dept., Cornell Univ., Ithaca, NY, USA", 18270 journalabr = "Commun ACM", 18271 keywords = "axiomatic method; computer metatheory; computer operating systems; computer systems programming; concurrent processes; correctness proofs; deadlock; multiprogramming; mutual exclusion; parallel processing; parallel programs; program testing; program verification; structured; synchronisation", 18272 treatment = "P Practical", 18273} 18274 18275@Article{Madison:1976:CPL, 18276 author = "A. Wayne Madison and Alan P. Batson", 18277 title = "Characteristics of Program Localities", 18278 journal = j-CACM, 18279 volume = "19", 18280 number = "5", 18281 pages = "285--294", 18282 month = may, 18283 year = "1976", 18284 CODEN = "CACMA2", 18285 ISSN = "0001-0782", 18286 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18287 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib", 18288 abstract = "The term ``locality'' is used to denote that subset of a program's segments which are referenced during a particular phase of its execution. In this paper the concept of a locality is made more explicit through a formal definition of what constitutes a phase of localized reference behavior, and by a corresponding mechanism for the detection of localities in actual reference strings. This definition provides for the existence of a hierarchy of localities at any given time. empirical data from a sample of production Algol 60 programs is used to display distributions of locality sizes and lifetimes. These results are discussed in terms of their implications for the modeling of program behavior and memory management in virtual memory systems.", 18289 acknowledgement = ack-nhfb, 18290 classcodes = "C6120 (File organisation); C6150G (Diagnostic, testing, debugging and evaluating systems)", 18291 classification = "723", 18292 corpsource = "Dept. of Appl. Math. and Computer Sci., Univ. of Virginia, Charlottesville, VA, USA", 18293 journalabr = "Commun ACM", 18294 keywords = "bounded locality intervals; computer operating systems; computer programming languages; locality; memory; memory management; program behaviour; storage management; virtual; virtual storage", 18295 treatment = "P Practical", 18296} 18297 18298@Article{Prieve:1976:VOV, 18299 author = "Barton G. Prieve and R. S. Fabry", 18300 title = "{VMIN} --- an Optimal Variable-Space Page Replacement Algorithm", 18301 journal = j-CACM, 18302 volume = "19", 18303 number = "5", 18304 pages = "295--297", 18305 month = may, 18306 year = "1976", 18307 CODEN = "CACMA2", 18308 ISSN = "0001-0782", 18309 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18310 bibsource = "Compendex database", 18311 abstract = "A criterion for comparing variable space page replacement algorithms is presented. An optimum page replacement algorithm, called VMIN, is described and shown to be optimum with respect to this criterion. The results of simulating VMIN, Denning's working set, and the page partitioning replacement algorithms on five virtual memory programs are presented to demonstrate the improvement possible over the known realizable variable space algorithms.", 18312 acknowledgement = ack-nhfb, 18313 classcodes = "C6120 (File organisation)", 18314 classification = "723", 18315 corpsource = "Bell Labs., Naperville, IL, USA", 18316 journalabr = "Commun ACM", 18317 keywords = "computer operating systems; computer systems programming --- Supervisory and Executive Programs; demand paging; multilevel memory; optimal page replacement; page replacement algorithms; performance measurement; systems; virtual memory programs; virtual storage; VMIN; working set", 18318} 18319 18320@Article{Chu:1976:APR, 18321 author = "Wesley W. Chu and Holger Opderbeck", 18322 title = "Analysis of the {PFF} Replacement Algorithm via a {Semi-Markov} Model", 18323 journal = j-CACM, 18324 volume = "19", 18325 number = "5", 18326 pages = "298--304", 18327 month = may, 18328 year = "1976", 18329 CODEN = "CACMA2", 18330 ISSN = "0001-0782", 18331 MRclass = "68A50", 18332 MRnumber = "54 9194", 18333 mrreviewer = "U. M. Von Maydell", 18334 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18335 bibsource = "Compendex database", 18336 note = "Papers from the Fifth ACM Symposium on Operating Systems Principles (Univ. Texas, Austin, Tex., 1975). See corrigendum \cite{Chu:1976:CAP}.", 18337 abstract = "An analytical model is presented to estimate the performance of the Page Fault Frequency (PFF) replacement algorithm. In this model, program behavior is represented by the LRU stack distance model and the PFF replacement algorithm is represented by a semi-Markov model. Using these models, such parameters as the inter-page-fault interval distribution, the probability of the number of distinct pages being referenced during an inter-page-fault interval, etc., may be analytically determined. Using these models to evaluate these parameter values permits study of the performance of the replacement algorithm by simulating the page fault events rather than every page reference event. This significantly reduces the required computation time in estimating the performance of the PFF algorithm.", 18338 acknowledgement = ack-nhfb, 18339 classcodes = "C6120 (File organisation)", 18340 classification = "723", 18341 corpsource = "Univ. of California, Los Angeles, CA, USA", 18342 journalabr = "Commun ACM", 18343 keywords = "behaviour; computer operating systems; computer systems programming --- Supervisory and Executive Programs; mathematical models; of replacement algorithm; page fault events; Page Fault Frequency; PFF replacement algorithm; program; semi Markov model; simulation; virtual storage", 18344 treatment = "P Practical", 18345} 18346 18347@Article{Taulbee:1976:PEP, 18348 author = "O. E. Taulbee and S. D. Conte", 18349 title = "Production and employment of {Ph.D.}'s in computer science", 18350 journal = j-CACM, 18351 volume = "19", 18352 number = "6", 18353 pages = "311--313", 18354 month = jun, 18355 year = "1976", 18356 CODEN = "CACMA2", 18357 ISSN = "0001-0782", 18358 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18359 acknowledgement = ack-nhfb, 18360 classcodes = "C0200 (General computer topics)", 18361 corpsource = "Univ. of Pittsburgh, Pittsburgh, PA, USA", 18362 keywords = "computer science; employment; faculty; production; salaries", 18363 treatment = "P Practical", 18364} 18365 18366@Article{Severance:1976:PGA, 18367 author = "Dennis G. Severance and Ricardo A. Duhne", 18368 title = "A Practitioner's Guide to Addressing Algorithms", 18369 journal = j-CACM, 18370 volume = "19", 18371 number = "6", 18372 pages = "314--326", 18373 month = jun, 18374 year = "1976", 18375 CODEN = "CACMA2", 18376 ISSN = "0001-0782", 18377 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18378 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 18379 abstract = "This paper consolidates a number of popular rules of thumb which have been suggested for the design of record addressing algorithms, and discusses the applicability of these rules to large commercial databases. Guidelines for selecting identifier transformations, overflow techniques, loading factors, bucket sizes, and loading order are considered. Particular attention is focused on the reasonableness of common heuristics for determining primary or secondary bucket sizes. A mathematical model which explicitly considers storage device characteristics and time\slash space cost tradeoffs is used to analyze the effect of design parameters on overall system costs. A specific design example is presented and solved.", 18380 acknowledgement = ack-nhfb, 18381 annote = "This paper consolidates a number of popular rules of thumb which have been suggested for the design of record addressing algorithms, and discusses the applicability of these rules to large commercial databases.", 18382 classcodes = "C6120 (File organisation); C7100 (Business and administration)", 18383 classification = "823; 901", 18384 corpsource = "Cornell Univ., Ithaca, NY, USA", 18385 journalabr = "Commun ACM", 18386 keywords = "bucket; computer systems programming --- Utility Programs; data management; data processing; database management systems; file organisation; file retrieval; functions; hashing; information; information retrieval systems --- Evaluation; loading factors; record addressing; retrieval; rules of thumb; searching; sizes; synonym resolution", 18387 treatment = "A Application; E Economic; P Practical", 18388} 18389 18390@Article{Baskett:1976:IMC, 18391 author = "Forest Baskett and Alan Jay Smith", 18392 title = "Interference in Multiprocessor Computer Systems with Interleaved Memory", 18393 journal = j-CACM, 18394 volume = "19", 18395 number = "6", 18396 pages = "327--334", 18397 month = jun, 18398 year = "1976", 18399 CODEN = "CACMA2", 18400 ISSN = "0001-0782", 18401 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18402 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 18403 abstract = "The memory interference caused by several processors simultaneously using several memory modules is analyzed. Exact results are computed for a simple model of such a system. The limiting value is derived for the relative degree of memory interference as the system size increases. The assumptions and results of the simple model are tested against some measurements of program behavior and simulations of systems using memory references from real programs. The model results provide a good indication of the performance that should be expected from real systems of this type.", 18404 acknowledgement = ack-nhfb, 18405 classcodes = "C4290 (Other computer theory); C5400 (Analogue and digital computers and systems)", 18406 classification = "722", 18407 corpsource = "Stanford Univ., Stanford, CA, USA", 18408 journalabr = "Commun ACM", 18409 keywords = "computer systems; computer systems, digital; interference; interleaved memory; memory; multiprocessing; multiprocessing systems; multiprocessor; trace driven simulation", 18410 treatment = "A Application; T Theoretical or Mathematical", 18411} 18412 18413@Article{Frieder:1976:PDA, 18414 author = "Gideon Frieder and Harry J. Saal", 18415 title = "Process for the Determination of Addresses in Variable Length Addressing", 18416 journal = j-CACM, 18417 volume = "19", 18418 number = "6", 18419 pages = "335--338", 18420 month = jun, 18421 year = "1976", 18422 CODEN = "CACMA2", 18423 ISSN = "0001-0782", 18424 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18425 bibsource = "Compendex database", 18426 abstract = "An algorithm is presented for the assignment of instruction addresses and formats under the following conditions: the length of the instruction varies as a function of the distance of the instruction from its target; there exists an optimality criterion which implies some preferential choices subject to the addressing constraints. This may be, for example, achieving the smallest number of long instructions, in which case the total code length is minimized, or minimizing the assigned address of a specified point in the program. The algorithm is suitable for arbitrary program structure and a choice of optimization criteria.", 18427 acknowledgement = ack-nhfb, 18428 classcodes = "C6110 (Systems analysis and programming); C6120 (File organisation)", 18429 classification = "723", 18430 corpsource = "IBM Israel Sci. Center, Haifa, Israel", 18431 journalabr = "Commun ACM", 18432 keywords = "assembler; computer operating systems; formats; instruction addresses; paging; programming; variable length addressing; virtual storage", 18433 treatment = "P Practical", 18434} 18435 18436@Article{Wise:1976:RLE, 18437 author = "David S. Wise", 18438 title = "Referencing Lists by an Edge", 18439 journal = j-CACM, 18440 volume = "19", 18441 number = "6", 18442 pages = "338--342", 18443 month = jun, 18444 year = "1976", 18445 CODEN = "CACMA2", 18446 ISSN = "0001-0782", 18447 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18448 bibsource = "Compendex database", 18449 abstract = "An edge reference into a list structure is a pair of pointers to adjacent nodes. Such a reference often requires little additional space, but its use can yield efficient algorithms. For instance, a circular link between the ends of a list is redundant if the list is always referenced by that edge, and list traversal is easier when that link is null. Edge references also allow threading of nonrecursive lists, can replace some header cells, and enhance the famous exclusive-or trick to double-link lists.", 18450 acknowledgement = ack-nhfb, 18451 classcodes = "C6110 (Systems analysis and programming); C6120 (File organisation); C6130 (Data handling techniques)", 18452 classification = "723", 18453 corpsource = "Indiana Univ., Bloomington, IN, USA", 18454 journalabr = "Commun ACM", 18455 keywords = "circular link; computer programming --- Subroutines; computer programming languages; cursor; data structures; doubly linked; edge reference; header cells; list; list processing; list structure; overlapping sublist; pointer; traversal", 18456 treatment = "A Application; P Practical", 18457} 18458 18459@Article{Schumacher:1976:SAD, 18460 author = "Helmut Schumacher and Kenneth C. Sevcik", 18461 title = "The synthetic approach to decision table conversion", 18462 journal = j-CACM, 18463 volume = "19", 18464 number = "6", 18465 pages = "343--351", 18466 month = jun, 18467 year = "1976", 18468 CODEN = "CACMA2", 18469 ISSN = "0001-0782", 18470 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18471 bibsource = "Compendex database", 18472 abstract = "Previous approaches to the problem of automatically converting decision tables to computer programs have been based on decomposition. An optimal program is located only through implicit enumeration of all possible decision trees using a technique such as branch-and-bound. The new approach described in this paper uses dynamic programming to synthesize an optimal decision tree from which a program can be created. Using this approach, the efficiency of creating an optimal program is increased substantially, permitting generation of optimal programs for decision tables with as many as ten to twelve conditions.", 18473 acknowledgement = ack-nhfb, 18474 classcodes = "C4240 (Programming and algorithm theory); C6110 (Systems analysis and programming)", 18475 classification = "723; 921", 18476 corpsource = "Univ. of Toronto, Toronto, Ont., Canada", 18477 journalabr = "Commun ACM", 18478 keywords = "computer systems programming; decision table conversion; decision tables; decision trees; dynamic programming; mathematical techniques --- Combinatorial Mathematics; optimal program; programming theory", 18479 treatment = "A Application; T Theoretical or Mathematical", 18480} 18481 18482@Article{Clark:1976:ELM, 18483 author = "Douglas W. Clark", 18484 title = "An Efficient List Moving Algorithm Using constant Workspace", 18485 journal = j-CACM, 18486 volume = "19", 18487 number = "6", 18488 pages = "352--354 (or 353--354??)", 18489 month = jun, 18490 year = "1976", 18491 CODEN = "CACMA2", 18492 ISSN = "0001-0782", 18493 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18494 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 18495 abstract = "An efficient algorithm is presented for moving arbitrary list structures, using no storage (apart from program variables) other than that required to hold the original list and the copy. The original list is destroyed as it is moved. No mark bits are necessary, but pointers to the copy must be distinguishable from pointers to the original. The algorithm is superior in execution speed to previous algorithms for the same problem. Some variations and extensions of the algorithm are discussed.", 18496 acknowledgement = ack-nhfb, 18497 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 18498 classification = "723", 18499 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 18500 journalabr = "Commun ACM", 18501 keywords = "complexity; computer programming --- Subroutines; computer programming languages; constant workspace; data processing --- Data Structures; LISP; list copying; list moving; list processing; space; storage management", 18502 treatment = "A Application; T Theoretical or Mathematical", 18503} 18504 18505@Article{Steele:1976:CMC, 18506 author = "Guy L. {Steele, Jr.}", 18507 title = "Corrigendum: {``Multiprocessing Compactifying Garbage Collection''}", 18508 journal = j-CACM, 18509 volume = "19", 18510 number = "6", 18511 pages = "354--354", 18512 month = jun, 18513 year = "1976", 18514 CODEN = "CACMA2", 18515 ISSN = "0001-0782", 18516 bibdate = "Sat Jan 18 15:29:03 1997", 18517 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Seiferas/1976.bib", 18518 note = "See \cite{Steele:1975:MCG}.", 18519} 18520 18521@Article{Knott:1976:NSP, 18522 author = "Gary D. Knott", 18523 title = "A Numbering System for Permutations of Combinations", 18524 journal = j-CACM, 18525 volume = "19", 18526 number = "6", 18527 pages = "355--356", 18528 month = jun, 18529 year = "1976", 18530 CODEN = "CACMA2", 18531 ISSN = "0001-0782", 18532 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18533 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Seiferas/1976.bib", 18534 acknowledgement = ack-nhfb, 18535 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics); C7310 (Mathematics computing)", 18536 corpsource = "Nat. Inst. of Health, Bethesda, MD, USA", 18537 keywords = "Algol procedures; coding systems; combinatorial mathematics; combinatorics; inverse; permuted combination numbering system; storage mapping functions", 18538 treatment = "A Application; T Theoretical or Mathematical", 18539} 18540 18541@Article{Conte:1976:TCC, 18542 author = "S. D. Conte and M. H. Halstead", 18543 title = "Technology of Computer Center Management: a Proposed Course for Graduate Professional Programs in Computer Science or in Information Systems", 18544 journal = j-CACM, 18545 volume = "19", 18546 number = "7", 18547 pages = "369--370", 18548 month = jul, 18549 year = "1976", 18550 CODEN = "CACMA2", 18551 ISSN = "0001-0782", 18552 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18553 bibsource = "Compendex database", 18554 abstract = "This paper is a report on a course entitled, ``The Technology of Computer Center Management,'' which has been offered at Purdue for the past four years. The course is suitable either for graduate professional programs in information systems or for graduate professional programs in computer science. Although there are currently no suitable textbooks for this course, a selected bibliography is included which covers various course topics.", 18555 acknowledgement = ack-nhfb, 18556 classcodes = "C0220 (Computing education and training)", 18557 classification = "723; 901; 912", 18558 corpsource = "Purdue Univ., West Lafayette, IN, USA", 18559 journalabr = "Commun ACM", 18560 keywords = "administration; computer centre management; computer science; computer system; data processing; education; educational courses; graduate professional programs; information science; information systems; management; management science; performance", 18561 treatment = "P Practical", 18562} 18563 18564@Article{Keller:1976:FVP, 18565 author = "Robert M. Keller", 18566 title = "Formal Verification of Parallel Programs", 18567 journal = j-CACM, 18568 volume = "19", 18569 number = "7", 18570 pages = "371--384", 18571 month = jul, 18572 year = "1976", 18573 CODEN = "CACMA2", 18574 ISSN = "0001-0782", 18575 MRclass = "68A05", 18576 MRnumber = "54 14430", 18577 mrreviewer = "W. D. Maurer", 18578 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18579 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 18580 abstract = "Two formal models for parallel computation are presented: an abstract conceptual model and a parallel-program model. The former model does not distinguish between control and data states. The latter model is includes the capability for the representation of an infinite set of control states by allowing there to be arbitrarily many instruction pointers (or processes) executing the program. An induction principle is presented which treats the control and data state sets on the same ground. Through the use of ``place variables'', it is observed that certain correctness conditions can be expressed without enumeration of the set of all possible control states. Examples are presented in which the induction principle is used to demonstrate proofs of mutual exclusion. Also discussed is an extension of the program model which allows each process to have its own local variables and permits shared global variables. Correctness of certain forms of implementation is also discussed.", 18581 acknowledgement = ack-nhfb, 18582 classcodes = "C4290 (Other computer theory); C5400 (Analogue and digital computers and systems); C6150G (Diagnostic, testing, debugging and evaluating systems); C6150J (Operating systems)", 18583 classification = "722; 723", 18584 corpsource = "Princeton Univ., Princeton, NJ, USA", 18585 journalabr = "Commun ACM", 18586 keywords = "assertions; computer metatheory --- Programming Theory; computer systems, digital; correctness; data state sets; deadlock; exclusion; mutual; operating systems (computers); parallel processing; parallel programs; Petri net; program; testing; transition system; verification", 18587 treatment = "A Application; T Theoretical or Mathematical", 18588} 18589 18590@Article{King:1976:SEP, 18591 author = "James C. King", 18592 title = "Symbolic Execution and Program Testing", 18593 journal = j-CACM, 18594 volume = "19", 18595 number = "7", 18596 pages = "385--394", 18597 month = jul, 18598 year = "1976", 18599 CODEN = "CACMA2", 18600 ISSN = "0001-0782", 18601 MRclass = "68A05", 18602 MRnumber = "54 6541", 18603 mrreviewer = "P. W. Baker", 18604 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18605 bibsource = "Compendex database", 18606 abstract = "This paper describes the symbolic execution of programs. Instead of supplying the normal inputs to a program (e.g. numbers) one supplies symbols representing arbitrary values. The execution proceeds as in a normal execution except that values may be symbolic formulas over the input symbols. The difficult, yet interesting issues arise during the symbolic execution of conditional branch type statements. A particular system called EFFIGY which provides symbolic execution for program testing and debugging is also described. It interpretively executes programs written in a simple PL/I style programming language. It includes many standard debugging features, the ability to manage and to prove things about symbolic expressions, a simple program testing manager, and a program verifier. A brief discussion of the relationship between symbolic execution and program proving is also included.", 18607 acknowledgement = ack-nhfb, 18608 classcodes = "C6110 (Systems analysis and programming); C6150G (Diagnostic, testing, debugging and evaluating systems)", 18609 classification = "723", 18610 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NJ, USA", 18611 journalabr = "Commun ACM", 18612 keywords = "computer metatheory --- Formal Logic; computer programming languages; debugging; EFFIGY; effigy; interpretation; PL/I; program debugging; program proving; program testing; program verification; symbolic; symbolic execution", 18613 treatment = "P Practical; T Theoretical or Mathematical", 18614} 18615 18616@Article{Metcalfe:1976:EDP, 18617 author = "Robert M. Metcalfe and David R. Boggs", 18618 title = "{Ethernet}: Distributed Packet Switching for Local Computer Networks", 18619 journal = j-CACM, 18620 volume = "19", 18621 number = "7", 18622 pages = "395--404", 18623 month = jul, 18624 year = "1976", 18625 CODEN = "CACMA2", 18626 ISSN = "0001-0782", 18627 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18628 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib and ftp://ftp.ira.uka.de/pub/bibliography/Ai/Ai.misc.bib and ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib", 18629 abstract = "Ethernet is a branching broadcast communication system for carrying digital data packets among locally distributed computing stations. The packet transport mechanism provided by Ethernet has been used to build systems which can be viewed as either local computer networks or loosely coupled multiprocessors. \par An Ethernet's shared communication facility, its Ether, is a passive broadcast medium with no central control. Coordination of access to the Ether for packet broadcasts is distributed among the contending transmitting stations using controlled statistical arbitration. \par Switching of packets to their destinations on the Ether is distributed among the receiving stations using packet address recognition. Design principles and implementation are described, based on experience with an operating Ethernet of 100 nodes along a kilometer of coaxial cable. A model for estimating performance under heavy loads and a packet protocol for error controlled communication are included for completeness.", 18630 acknowledgement = ack-nhfb, 18631 classcodes = "B6210L (Computer communications); C5620 (Computer networks and techniques)", 18632 classification = "718; 722; 723", 18633 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 18634 journalabr = "Commun ACM", 18635 keywords = "broadcast; broadcast communication; communication; computer networks; computer systems, digital --- Real Time Operation; computers --- Data Communication Systems; data transmission; digital communication systems; distributed communication; distributed computing; distributed control; Ethernet; LANs; multiprocessing; multiprocessors; networks; operating; packet switching; statistical arbitration; switching systems", 18636 treatment = "A Application; P Practical", 18637} 18638 18639@Article{Cheng:1976:SDR, 18640 author = "Cheng-Wen Cheng and Jonas Rabin", 18641 title = "Synthesis of Decision Rules", 18642 journal = j-CACM, 18643 volume = "19", 18644 number = "7", 18645 pages = "404--406", 18646 month = jul, 18647 year = "1976", 18648 CODEN = "CACMA2", 18649 ISSN = "0001-0782", 18650 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18651 bibsource = "Compendex database", 18652 abstract = "Decision tables can be used as an effective tool during an interview to record the logic of processes to be automated. The result of such an interview is not a structure of complete decision tables but rather sets of decision rules. The purpose of this paper is to provide a procedure for synthesizing the decision rules and thus provide an aid in developing a structure of complete decision tables.", 18653 acknowledgement = ack-nhfb, 18654 classcodes = "C6110 (Systems analysis and programming); C7100 (Business and administration)", 18655 classification = "723; 922", 18656 corpsource = "Western Electric Res. Center, Princeton, NJ, USA", 18657 journalabr = "Commun ACM", 18658 keywords = "computer systems programming; data processing --- Security of Data; decision rules; decision tables; decision theory and analysis; interview; logical design; logical tables; management; specification language; system design", 18659 treatment = "P Practical; T Theoretical or Mathematical", 18660} 18661 18662@Article{Fishman:1976:SGD, 18663 author = "George S. Fishman", 18664 title = "Sampling from the {Gamma-distribution} on a computer", 18665 journal = j-CACM, 18666 volume = "19", 18667 number = "7", 18668 pages = "407--409", 18669 month = jul, 18670 year = "1976", 18671 CODEN = "CACMA2", 18672 ISSN = "0001-0782", 18673 MRclass = "65C10", 18674 MRnumber = "54 6449", 18675 mrreviewer = "Artenio De Matteis", 18676 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18677 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1976.bib", 18678 abstract = "This paper describes a new technique for sampling from the gamma distribution on a digital computer and compares it with an alternative technique. The method suggested uses the rejection technique.", 18679 acknowledgement = ack-nhfb, 18680 classcodes = "B0240 (Probability and statistics); C1140 (Probability and statistics); C7100 (Business and administration); C7310 (Mathematics computing)", 18681 classification = "912; 922", 18682 corpsource = "Univ. of North Carolina, Chapel Hill, NC, USA", 18683 country = "USA", 18684 descriptors = "RNG; simulation;", 18685 enum = "951", 18686 journalabr = "Commun ACM", 18687 keywords = "gamma distribution; gamma variates; operations research; probability; probability --- Random Processes; rejection technique; sampling; shape parameter; Wallace's method", 18688 language = "English", 18689 references = "0", 18690 treatment = "A Application; T Theoretical or Mathematical", 18691} 18692 18693@Article{Maly:1976:CT, 18694 author = "Kurt Maly", 18695 title = "Compressed Tries", 18696 journal = j-CACM, 18697 volume = "19", 18698 number = "7", 18699 pages = "409--415", 18700 month = jul, 18701 year = "1976", 18702 CODEN = "CACMA2", 18703 ISSN = "0001-0782", 18704 MRclass = "68A50", 18705 MRnumber = "54 9195", 18706 mrreviewer = "Fabrizio Luccio", 18707 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18708 bibsource = "Compendex database", 18709 abstract = "This paper presents a new data structure, called a compressed trie or C-trie, to be used in information retrieval systems. It has the same underlying m-ary tree structure as a trie, where m is a parameter of the trie, but whereas the fields of the nodes in a trie have to be large enough to hold a key or at least a pointer, the fields in a C-trie are only one bit long. First, the C-trie is analyzed as a data structure, and then several methods of its use for relatively static data bases are discussed.", 18710 acknowledgement = ack-nhfb, 18711 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval)", 18712 classification = "723; 901", 18713 corpsource = "Univ. of Minnesota, Minneapolis, MN, USA", 18714 journalabr = "Commun ACM", 18715 keywords = "data processing --- Data Structures; data storage, digital; data structure; data structures; database management systems; databases; information; information retrieval systems; key; m ary; retrieval systems; retrieval time; storage requirement; tree; trie", 18716 treatment = "P Practical", 18717} 18718 18719@Article{Burton:1976:BSV, 18720 author = "Warren Burton", 18721 title = "A buddy system variation for disk storage allocation", 18722 journal = j-CACM, 18723 volume = "19", 18724 number = "7", 18725 pages = "416--417", 18726 month = jul, 18727 year = "1976", 18728 CODEN = "CACMA2", 18729 ISSN = "0001-0782", 18730 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18731 bibsource = "Compendex database", 18732 abstract = "A generalization of the buddy system for storage allocation is described. It is shown how limitations on block sizes make it possible to force logical storage blocks to coincide with physical storage blocks, such as tracks and cylinders. This new variation of the buddy system has been developed for allocating storage for geometrical data items (polygons, sets of points, etc. ).", 18733 acknowledgement = ack-nhfb, 18734 classcodes = "C5320C (Storage on moving magnetic media); C6120 (File organisation)", 18735 classification = "722; 723", 18736 corpsource = "Univ. of East Anglia, Norwich, UK", 18737 journalabr = "Commun ACM", 18738 keywords = "buddy system; computer operating systems; computer systems programming --- Supervisory and Executive Programs; data storage, magnetic --- Disk; disc storage; integral valued function; magnetic disc and drum storage; storage allocation", 18739 treatment = "P Practical", 18740} 18741 18742@Article{Gonnet:1976:HAE, 18743 author = "G. H. Gonnet", 18744 title = "Heaps applied to event driven mechanisms", 18745 journal = j-CACM, 18746 volume = "19", 18747 number = "7", 18748 pages = "417--418", 18749 month = jul, 18750 year = "1976", 18751 CODEN = "CACMA2", 18752 ISSN = "0001-0782", 18753 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18754 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1976.bib", 18755 acknowledgement = ack-nhfb, 18756 classcodes = "C4240 (Programming and algorithm theory); C6120 (File organisation)", 18757 corpsource = "Univ. of Waterloo, Waterloo, Ont., Canada", 18758 country = "USA", 18759 descriptors = "Simulation; event set;", 18760 enum = "7331", 18761 keywords = "algorithm theory; data structures; discrete event simulation; event; heaps; priority queue; scanning mechanisms", 18762 language = "English", 18763 references = "0", 18764 treatment = "P Practical", 18765} 18766 18767@Article{Donovan:1976:TPS, 18768 author = "John J. Donovan", 18769 title = "Tools and Philosophy for Software Education", 18770 journal = j-CACM, 18771 volume = "19", 18772 number = "8", 18773 pages = "430--436", 18774 month = aug, 18775 year = "1976", 18776 CODEN = "CACMA2", 18777 ISSN = "0001-0782", 18778 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18779 bibsource = "Compendex database", 18780 abstract = "This paper describes a set of tools and a philosophy for teaching software that have been found very useful in course at MIT over the past seven years. \par The tools include programs such as simulators, graders, compilers, and monitor. These allow the instructor to augment the basic concepts with relevant, exciting, and economical student project activities.", 18781 acknowledgement = ack-nhfb, 18782 classcodes = "C0220 (Computing education and training); C6110 (Systems analysis and programming)", 18783 classification = "723; 901", 18784 corpsource = "MIT, Cambridge, MA, USA", 18785 journalabr = "Commun ACM", 18786 keywords = "computer programming; computer software; education; grading; grading programs; philosophy; programs; simulators; software education; student assignments; tools", 18787 treatment = "P Practical", 18788} 18789 18790@Article{Tennent:1976:DSP, 18791 author = "R. D. Tennent", 18792 title = "The Denotational Semantics of Programming Languages", 18793 journal = j-CACM, 18794 volume = "19", 18795 number = "8", 18796 pages = "437--453", 18797 month = aug, 18798 year = "1976", 18799 CODEN = "CACMA2", 18800 ISSN = "0001-0782", 18801 MRclass = "68A05", 18802 MRnumber = "55 1791", 18803 mrreviewer = "Gianni Aguzzi", 18804 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18805 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 18806 abstract = "This paper is a tutorial introduction to the theory of programming language semantics developed by D. Scott and C. Strachey. The application of the theory to formal language specification is demonstrated and other applications are surveyed. The first language considered, LOOP, is very elementary and its definition merely introduces the notation and methodology of the approach. Then the semantic concepts of environments, stores, and continuations are introduced to model classes of programming language features and the underlying mathematical theory of computation due to Scott is motivated and outlined. Finally, the paper presents a formal definition of the language GEDANKEN.", 18807 acknowledgement = ack-nhfb, 18808 classcodes = "C4210 (Formal logic)", 18809 classification = "721; 723", 18810 corpsource = "Queen's Univ., Kingston, Ont., Canada", 18811 journalabr = "Commun ACM", 18812 keywords = "applicative; automata theory --- Context Free Languages; computer metatheory; computer programming languages --- Analysis; continuation; environment; formal language; formal languages; function; functional; GEDANKEN; gedanken; higher order; higher-order function; imperative; loop; LOOP; mathematical theory of computation; pl-semantics binder; programming language; programming languages; recursive definition; semantics; store; theory of computation", 18813 treatment = "A Application; T Theoretical or Mathematical", 18814} 18815 18816@Article{Clark:1976:DS, 18817 author = "James H. Clark", 18818 title = "Designing Surfaces in {3-D}", 18819 journal = j-CACM, 18820 volume = "19", 18821 number = "8", 18822 pages = "454--460", 18823 month = aug, 18824 year = "1976", 18825 CODEN = "CACMA2", 18826 ISSN = "0001-0782", 18827 MRclass = "68A99 (50D15 65D10)", 18828 MRnumber = "54 4216", 18829 mrreviewer = "Wolfgang Bohm", 18830 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18831 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/virtual.bib", 18832 abstract = "An experimental system for computer-aided design of free-form surfaces in three dimensions is described. The surfaces are represented in the system as parametric basis splines. The principal features of the system are: the surfaces are rendered as isoparametric line drawings on a head-mounted display, and they are designed with the aid of a three-dimensional ``wand,'' which allows 3-D movements of the points controlling the shapes of the surfaces; all of the interactions with the surfaces are in real-time; and the mathematical formulations used assume no knowledge of them by the user of the system. Also examined are some of the features that should be part of a practical 3-D system for designing space-forms.", 18833 acknowledgement = ack-nhfb, 18834 classcodes = "C5540 (Terminals and graphic displays)", 18835 classification = "722; 723; 901", 18836 corpsource = "Univ. of Utah, Salt Lake City, UT, USA", 18837 journalabr = "Commun ACM", 18838 keywords = "3D displays; B splines; CAD; computer graphics; computer peripheral equipment --- Light Pens; computer systems, digital --- Real Time Operation; computer-aided design; engineering --- Computer Aided Design; free form surfaces; image processing; isoparametric line drawings; picture processing; real; surface design; surfaces; three dimensional surfaces; time graphics", 18839 treatment = "A Application; P Practical; X Experimental", 18840} 18841 18842@Article{Harrison:1976:POS, 18843 author = "Michael A. Harrison and Walter L. Ruzzo and Jeffrey D. Ullman", 18844 title = "Protection in Operating Systems", 18845 journal = j-CACM, 18846 volume = "19", 18847 number = "8", 18848 pages = "461--471", 18849 month = aug, 18850 year = "1976", 18851 CODEN = "CACMA2", 18852 ISSN = "0001-0782", 18853 MRclass = "68A99", 18854 MRnumber = "54 14474", 18855 mrreviewer = "George I. Davida", 18856 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18857 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib", 18858 abstract = "A model of protection mechanisms in computing systems is presented and its appropriateness is argued. The ``safety'' problem for protection systems under this model is to determine in a given situation whether a subject can acquire a particular right to an object. In restricted cases, it can be shown that this problem is decidable; i.e., there is an algorithm to determine whether a system in a particular configuration is safe. In general, and under surprisingly weak assumptions, it cannot be decided if a situation is safe. Various implications of this fact are discussed.", 18859 acknowledgement = ack-nhfb, 18860 classcodes = "C4210 (Formal logic); C4220 (Automata theory); C6150J (Operating systems)", 18861 classification = "721; 723", 18862 corpsource = "Univ. of California, Berkeley, CA, USA", 18863 journalabr = "Commun ACM", 18864 keywords = "(computers); automata theory --- Turing Machines; computability and decidability; computer operating systems --- Design; computer security; data processing; decidability; operating systems; protection; protection systems; security model; security of data; Turing machine; Turing machines", 18865 ort = "ordner sicherheit", 18866 treatment = "P Practical; T Theoretical or Mathematical", 18867} 18868 18869@Article{Hirschberg:1976:ITO, 18870 author = "D. S. Hirschberg", 18871 title = "An Insertion Technique for One-Sided Height-Balanced Trees", 18872 journal = j-CACM, 18873 volume = "19", 18874 number = "8", 18875 pages = "471--473", 18876 month = aug, 18877 year = "1976", 18878 CODEN = "CACMA2", 18879 ISSN = "0001-0782", 18880 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18881 bibsource = "Compendex database", 18882 abstract = "A restriction on height-balanced binary trees is presented. It is seen that this restriction reduces the extra memory requirements by half (from two extra bits per node to one) and maintains fast search capabilities at a cost of increased time requirements for inserting new nodes.", 18883 acknowledgement = ack-nhfb, 18884 classcodes = "C4210 (Formal logic)", 18885 classification = "723", 18886 corpsource = "Princeton Univ., Princeton, NJ, USA", 18887 journalabr = "Commun ACM", 18888 keywords = "balanced; balanced trees; binary; binary trees; computer programming; data processing; insertion technique; one sided height; search; trees; trees (mathematics)", 18889 treatment = "A Application; T Theoretical or Mathematical", 18890} 18891 18892@Article{Chu:1976:CAP, 18893 author = "Wesley W. Chu and Holger Opderbeck", 18894 title = "Corrigendum: {``Analysis of the PFF replacement algorithm via a semi-Markov model''}", 18895 journal = j-CACM, 18896 volume = "19", 18897 number = "9", 18898 month = sep, 18899 year = "1976", 18900 CODEN = "CACMA2", 18901 ISSN = "0001-0782", 18902 MRclass = "529.68A50", 18903 MRnumber = "55 6998", 18904 bibdate = "Tue Dec 26 13:35:07 1995", 18905 note = "See \cite{Chu:1976:APR}.", 18906 acknowledgement = ack-nhfb, 18907} 18908 18909@Article{Wegbreit:1976:CRC, 18910 author = "Ben Wegbreit", 18911 title = "Corrigendum: ``{Faster Retrieval from Context Trees}''", 18912 journal = j-CACM, 18913 volume = "19", 18914 number = "9", 18915 pages = "??--??", 18916 month = sep, 18917 year = "1976", 18918 CODEN = "CACMA2", 18919 ISSN = "0001-0782", 18920 bibdate = "Sat Jan 18 15:31:01 1997", 18921 note = "See \cite{Wegbreit:1976:FRC}.", 18922 keywords = "context trees; data structures; frame problem; variable bindings", 18923 xxnote = "Cannot find this corrigendum in 1976--1977 issues, or on Compendex database, or in ACM Computing Archive CD-ROM.??", 18924} 18925 18926@Article{Wadler:1976:AAR, 18927 author = "Philip L. Wadler", 18928 title = "Analysis of an Algorithm for Real Time Garbage Collection", 18929 journal = j-CACM, 18930 volume = "19", 18931 number = "9", 18932 pages = "491--500", 18933 month = sep, 18934 year = "1976", 18935 CODEN = "CACMA2", 18936 ISSN = "0001-0782", 18937 MRclass = "68A50", 18938 MRnumber = "54 14473", 18939 mrreviewer = "George I. Davida", 18940 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18941 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 18942 abstract = "List processing systems often use a method called garbage collection for reclaiming unused memory space. A real time garbage collection system avoids suspending the operations of a list processor for the long times that garbage collection normally requires by performing garbage collection on a second processor in parallel with list processing operations, or on a single processor time-shared with them. Algorithms for recovering discarded list structures in this manner are presented and analyzed to determine sufficient conditions under which the list processor never need to wait on the collector. These techniques are shown to require at most twice as much processing power as regular garbage collectors, if they are used efficiently. The average behavior of the program is shown to be very nearly equal to the worst-case performance, so that the sufficient conditions are also suitable for measuring the typical behavior of the algorithm.", 18943 acknowledgement = ack-nhfb, 18944 classcodes = "C5400 (Analogue and digital computers and systems); C6120 (File organisation)", 18945 classification = "723", 18946 comment = "This algorithm contains an error that is pointed out by \cite{Gries:1977:BPB}", 18947 corpsource = "Stanford Univ., Stanford, CA, USA", 18948 journalabr = "Commun ACM", 18949 keywords = "computer programming --- Subroutines; computer programming languages --- lisp; computer systems programming; data processing --- Data Structures; data structure; data structures; garbage collection; Lisp; list; list processor; multiprocessing; parallel processing; processing; real time; storage management; storage reclamation; time change", 18950 treatment = "P Practical; T Theoretical or Mathematical", 18951} 18952 18953@Article{Yap:1976:NUB, 18954 author = "Chee K. Yap", 18955 title = "New Upper Bounds for Selection", 18956 journal = j-CACM, 18957 volume = "19", 18958 number = "9", 18959 pages = "501--508", 18960 month = sep, 18961 year = "1976", 18962 CODEN = "CACMA2", 18963 ISSN = "0001-0782", 18964 MRclass = "68A20", 18965 MRnumber = "54 6559", 18966 mrreviewer = "Thomas G. Szymanski", 18967 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18968 bibsource = "Compendex database", 18969 abstract = "The worst-case, minimum number of comparisons complexity V//i (n) of the i-th selection problem is considered. A new upper bound for V//i (n) improves the bound given by the standard Hadian-Sobel algorithm by a generalization of the Kirkpatrick-Hadian-Sobel algorithm, and extends Kirkpatrick's method to a much wider range of application. This generalization compares favorably with a recent algorithm by L. Hyafil.", 18970 acknowledgement = ack-nhfb, 18971 classcodes = "C4240 (Programming and algorithm theory)", 18972 classification = "723", 18973 corpsource = "Dept. of Computer Sci., Yale Univ., New Haven, CT, USA", 18974 journalabr = "Commun ACM", 18975 keywords = "comparison problems; computational complexity; computer metatheory; concrete computational complexity; selection problem; upper bounds; worst case analysis", 18976 treatment = "T Theoretical or Mathematical", 18977} 18978 18979@Article{Loui:1976:WDT, 18980 author = "Michael C. Loui", 18981 title = "Weighted Derivation Trees", 18982 journal = j-CACM, 18983 volume = "19", 18984 number = "9", 18985 pages = "509--513", 18986 month = sep, 18987 year = "1976", 18988 CODEN = "CACMA2", 18989 ISSN = "0001-0782", 18990 MRclass = "68A30", 18991 MRnumber = "54 1727", 18992 mrreviewer = "Stephen Soule", 18993 bibdate = "Tue Mar 25 13:26:09 MST 1997", 18994 bibsource = "Compendex database", 18995 abstract = "The nodes of a weighted derivation tree are associated with weighting functions over the vocabulary of a context-free grammar. An algorithm is presented for constructing the optimal derivation tree having the same structure as a given weighted derivation tree. In addition, the correctness of the algorithm is established. The method may be applied to problems involving probabilistic parsing or combinatorial optimization.", 18996 acknowledgement = ack-nhfb, 18997 classcodes = "C4210 (Formal logic)", 18998 classification = "721; 723; 921", 18999 corpsource = "Dept. of Computer Sci., Yale Univ., New Haven, CT, USA", 19000 journalabr = "Commun ACM", 19001 keywords = "ambiguity; automata theory; combinatorial optimisation; computer programming --- Subroutines; context free grammars; context-free grammars; derivation trees; mathematical programming; parse tree; parsing; probabilistic; structural; trees (mathematics); weighting functions", 19002 treatment = "T Theoretical or Mathematical", 19003} 19004 19005@Article{Walter:1976:RAC, 19006 author = "Kenneth G. Walter", 19007 title = "Recursion Analysis for Compiler Optimization", 19008 journal = j-CACM, 19009 volume = "19", 19010 number = "9", 19011 pages = "514--516", 19012 month = sep, 19013 year = "1976", 19014 CODEN = "CACMA2", 19015 ISSN = "0001-0782", 19016 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19017 bibsource = "Compendex database", 19018 abstract = "A relatively simple method for the detection of recursive use of procedures is presented for use in compiler optimization. Implementation considerations are discussed, and a modification of the algorithm is given to further improve optimization. This analysis can also be used to determine what possible subset of values could be assumed by variables which can only take on a relatively small discrete set of values. The most common are parameters of variables assuming values of label, procedure, or Pascal's enumerated type.", 19019 acknowledgement = ack-nhfb, 19020 classcodes = "C4290 (Other computer theory); C6150C (Compilers, interpreters and other processors)", 19021 classification = "723", 19022 corpsource = "Computing and Information Sci. Dept., Case Western Reserve Univ., Cleveland, OH, USA", 19023 journalabr = "Commun ACM", 19024 keywords = "compiler optimisation; computer operating systems; nonrecursion; optimisation; program compilers; recursion analysis; relative", 19025 treatment = "P Practical; T Theoretical or Mathematical", 19026} 19027 19028@Article{Bitner:1976:EGB, 19029 author = "James R. Bitner and Gideon Ehrlich and Edward M. Reingold", 19030 title = "Efficient Generation of the Binary Reflected {Gray} Code and Its Applications", 19031 journal = j-CACM, 19032 volume = "19", 19033 number = "9", 19034 pages = "517--521", 19035 month = sep, 19036 year = "1976", 19037 CODEN = "CACMA2", 19038 ISSN = "0001-0782", 19039 MRclass = "94A10 (68A10)", 19040 MRnumber = "54 12349", 19041 mrreviewer = "B. D. Sharma", 19042 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19043 bibsource = "Compendex database", 19044 abstract = "Algorithms are presented to generate the n-bit binary reflected Gray code and codewords of fixed weight in that code. Both algorithms are efficient in that the time required to generate the next element from the current one is constant. Applications to the generation of the combinations of n things taken k at a time, the compositions of integers, and the permutations of a multiset are discussed.", 19045 acknowledgement = ack-nhfb, 19046 classcodes = "C4240 (Programming and algorithm theory)", 19047 classification = "723; 921", 19048 corpsource = "Dept. of Computer Sci., Univ. of Illinois, Urbana-Champaign, IL, USA", 19049 journalabr = "Commun ACM", 19050 keywords = "algorithm theory; codes, symbolic; combinations; combinatorial computing; compositions; computer programming --- Subroutines; fixed weight; Gray code; mathematical techniques; subsets", 19051 treatment = "A Application; T Theoretical or Mathematical", 19052} 19053 19054@Article{Deutsch:1976:EIA, 19055 author = "L. Peter Deutsch and Daniel G. Bobrow", 19056 title = "An Efficient, Incremental, Automatic Garbage Collector", 19057 journal = j-CACM, 19058 volume = "19", 19059 number = "9", 19060 pages = "522--526", 19061 month = sep, 19062 year = "1976", 19063 CODEN = "CACMA2", 19064 ISSN = "0001-0782", 19065 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19066 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 19067 abstract = "This paper describes a new way of solving the storage reclamation problem for a system such as Lisp that allocates storage automatically from a heap, and does not require the programmer to give any indication that particular items are no longer useful or accessible. A reference count scheme for reclaiming non-self-referential structures, and a linearizing, compacting, copying scheme to reorganize all storage at the users discretion are proposed. The algorithms are designed to work well in systems which use multiple levels of storage, and large virtual address space. They depend on the fact that most cells are referenced exactly once, and that reference counts need only be accurate when storage is about to be reclaimed. A transaction file stores changes to reference counts, and a multiple reference table stores the count for items which are referenced more than once.", 19068 acknowledgement = ack-nhfb, 19069 classcodes = "C6120 (File organisation)", 19070 classification = "723", 19071 comment = "Transaction-based reference counting; interesting blend of marking and ref-counting collection", 19072 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 19073 journalabr = "Commun ACM", 19074 keywords = "address space; computer operating systems --- Storage Allocation; computer programming; computer programming languages --- lisp; garbage collector; Lisp; multiple reference; olit memory lisp; storage management; storage reclamation; table stores; transaction file stores; virtual", 19075 treatment = "P Practical; T Theoretical or Mathematical", 19076} 19077 19078@Article{Wegbreit:1976:FRC, 19079 author = "Ben Wegbreit", 19080 title = "Faster Retrieval from Context Trees", 19081 journal = j-CACM, 19082 volume = "19", 19083 number = "9", 19084 pages = "526--529", 19085 month = sep, 19086 year = "1976", 19087 CODEN = "CACMA2", 19088 ISSN = "0001-0782", 19089 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19090 bibsource = "Compendex database", 19091 note = "See corrigendum \cite{Wegbreit:1976:CRC}.", 19092 abstract = "Context trees provide a convenient way of storing data which is to be viewed as a hierarchy of contexts. This note presents an algorithm which improves on previous context tree retrieval algorithms. It is based on the observation that in typical uses context changes are infrequent relative to retrievals, so that data can be cached to speed up retrieval. A retrieval is started from the position of the previous retrieval and auxiliary structures are built up to make the search rapid. Algorithms for addition and deletion of data and for garbage collection are outlined.", 19093 acknowledgement = ack-nhfb, 19094 classcodes = "C4290 (Other computer theory); C6120 (File organisation)", 19095 classification = "723", 19096 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 19097 journalabr = "Commun ACM", 19098 keywords = "computer programming; context tree; context trees; data processing --- Data Structures; data structure; data structures; frame problem; garbage collection; retrieval algorithms; storage management; trees (mathematics); variable bindings", 19099 treatment = "T Theoretical or Mathematical", 19100} 19101 19102@Article{Blinn:1976:TRC, 19103 author = "James F. Blinn and Martin E. Newell", 19104 title = "Texture and Reflection in Computer Generated Images", 19105 journal = j-CACM, 19106 volume = "19", 19107 number = "10", 19108 pages = "542--547", 19109 month = oct, 19110 year = "1976", 19111 CODEN = "CACMA2", 19112 ISSN = "0001-0782", 19113 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19114 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.76.bib", 19115 abstract = "In 1974 E. A. Catmull developed a new algorithm for rendering images of bivariate surface patches. This paper describes extensions of this algorithm in the areas of texture simulation and lighting models. The parametrization of a patch defines a coordinate system which is used as a key for mapping patterns onto the surface. The intensity of the pattern at each picture element is computed as a weighted average of regions of the pattern definition function. The shape and size of this weighting function are chosen using digital signal processing theory. The patch rendering algorithm allows accurate computation of the surface normal to the patch at each picture element, permitting the simulation of mirror reflections. Several examples of images synthesized using these new techniques are included.", 19116 acknowledgement = ack-nhfb, 19117 annote = "early paper on texture mapping, discusses spherical sky textures", 19118 classcodes = "C5540 (Terminals and graphic displays); C6130B (Graphics techniques)", 19119 classification = "723", 19120 corpsource = "Univ. of Utah, Salt Lake City, UT, USA", 19121 journalabr = "Commun ACM", 19122 keywords = "CACM; computer graphics; computerised picture processing; graphic display; hidden surface removal; image processing; reflection of light; shading; texture environment; texture mapping; texture simulation", 19123 treatment = "A Application; P Practical; T Theoretical or Mathematical", 19124} 19125 19126@Article{Clark:1976:HGM, 19127 author = "James H. Clark", 19128 title = "Hierarchical Geometric Models for Visible Surface Algorithms", 19129 journal = j-CACM, 19130 volume = "19", 19131 number = "10", 19132 pages = "547--554", 19133 month = oct, 19134 year = "1976", 19135 CODEN = "CACMA2", 19136 ISSN = "0001-0782", 19137 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19138 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.76.bib", 19139 abstract = "By using an extension of traditional structure information, or a geometric hierarchy, five significant improvements to current techniques of computer picture production are possible. First, the range of complexity of an environment is greatly increased while the visible complexity of any given scene is kept within a fixed upper limit. Second, a meaningful way is provided to vary the amount of detail presented in a scene. Third, ``clipping'' becomes a very fast logarithmic search for the resolvable parts of the environment within the field of view. Fourth, frame to frame coherence and clipping define a graphical ``working set,'' or fraction of the total structure that should be present in primary store for immediate access by the visible surface algorithm. Finally, the geometric structure suggests a recursive descent, visible surface algorithm in which the computation time potentially grows linearly with the visible complexity of the scene.", 19140 acknowledgement = ack-nhfb, 19141 classcodes = "C5540 (Terminals and graphic displays); C6130B (Graphics techniques)", 19142 classification = "723; 921", 19143 corpsource = "Univ. of California, Santa Cruz, CA, USA", 19144 journalabr = "Commun ACM", 19145 keywords = "algorithms; computer graphics; geometric models; hidden surface; hierarchical data structures; image processing; mathematical techniques --- Combinatorial Mathematics; model; visible surface algorithms", 19146 treatment = "A Application; P Practical; T Theoretical or Mathematical", 19147} 19148 19149@Article{Levin:1976:PAD, 19150 author = "Joshua Z. Levin", 19151 title = "A Parametric Algorithm for Drawing Pictures of Solid Objects Composed of Quadric Surfaces", 19152 journal = j-CACM, 19153 volume = "19", 19154 number = "10", 19155 pages = "555--563", 19156 month = oct, 19157 year = "1976", 19158 CODEN = "CACMA2", 19159 ISSN = "0001-0782", 19160 MRclass = "68A10", 19161 MRnumber = "55 13867", 19162 mrreviewer = "Wolfgang Bohm", 19163 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19164 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/graphics.bib", 19165 abstract = "An algorithm for drawing pictures of three-dimensional objects, with surfaces made up of patches of quadric surfaces, is described. The emphasis of this algorithm is on calculating the intersections of quadric surfaces. A parameterization scheme is used. Each quadric surface intersection curve (QSIC) is represented as a set of coefficients and parameter limits. Each value of the parameter represents at most two points, and these may easily be distinguished. This scheme can find the coordinates of points of even quartic (fourth-order) intersection curves, using equations of no more than second order. Methods of parameterization for each type of QSIC are discussed, as well as surface bounding and hidden surface removal.", 19166 acknowledgement = ack-nhfb, 19167 classcodes = "C5540 (Terminals and graphic displays); C6130B (Graphics techniques)", 19168 classification = "723; 921", 19169 corpsource = "New York Univ., New York, NY, USA", 19170 journalabr = "Commun ACM", 19171 keywords = "algorithms; computer graphics; curves and surfaces; graphics; hidden; intersections; mathematical techniques --- Function Evaluation; parametric algorithm; quadric surface intersection curve; quadric surfaces; quadrics; scanline algorithms; solid objects; surface bounding; surface removal; surfaces; three dimensional", 19172 treatment = "A Application; P Practical; T Theoretical or Mathematical", 19173} 19174 19175@Article{Burtnyk:1976:IST, 19176 author = "N. Burtnyk and M. Wein", 19177 title = "Interactive Skeleton Techniques for Enhancing Motion Dynamics in Key Frame Animation", 19178 journal = j-CACM, 19179 volume = "19", 19180 number = "10", 19181 pages = "564--569", 19182 month = oct, 19183 year = "1976", 19184 CODEN = "CACMA2", 19185 ISSN = "0001-0782", 19186 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19187 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.76.bib", 19188 abstract = "A significant increase in the capability for controlling motion dynamics in key frame animation is achieved through skeleton control. This technique allows an animator to develop a complex motion sequence by animating a stick figure representation of an image. This control sequence is then used to drive an image sequence through the same movement. \par The simplicity of the stick figure image encourages a high level of interaction during the design stage. Its compatibility with the basic key frame animation technique permits skeleton control to be applied selectively to only those components of a composite image sequence that require enhancement.", 19189 acknowledgement = ack-nhfb, 19190 classcodes = "C5540 (Terminals and graphic displays); C6130B (Graphics techniques)", 19191 classification = "723; 742", 19192 corpsource = "Nat. Res. Council of Canada, Ottawa, Ont., Canada", 19193 journalabr = "Commun ACM", 19194 keywords = "computer generated animation; computer graphics; computerised picture processing; figure animation; image processing; interactive graphics; interactive skeleton; interactive skeleton control; key frame animation; motion analysis and motion dynamics; motion pictures --- Animation; skeleton control; stick; stick figure animation", 19195 treatment = "A Application; P Practical; T Theoretical or Mathematical", 19196} 19197 19198@Article{Frane:1976:BBS, 19199 author = "James W. Frane", 19200 title = "The {BMD} and {BMDP} Series of Statistical Computer Programs", 19201 journal = j-CACM, 19202 volume = "19", 19203 number = "10", 19204 pages = "570--576", 19205 month = oct, 19206 year = "1976", 19207 CODEN = "CACMA2", 19208 ISSN = "0001-0782", 19209 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19210 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/siggraph/76.bib", 19211 abstract = "The BMD and BMDP series are the results of methodological research and programming effort at the UCLA Health Sciences Computing Facility since 1957. The original users of the BMD and BMDP programs were intended to be researchers in the health sciences. However, the programs have been used for a wide variety of biological and behavioral applications. The programs are also used for problems in the physical sciences, although they are not intended to solve highly ill-conditioned problems which are sometimes encountered there. Control language, graphics capabilities, statistical features, data management and limitations are discussed.", 19212 acknowledgement = ack-nhfb, 19213 classcodes = "B0240 (Probability and statistics); C1140 (Probability and statistics); C6130 (Data handling techniques); C7310 (Mathematics computing); C7330 (Biology and medical computing); C7810 (Social and behavioural sciences computing)", 19214 classification = "723; 922", 19215 corpsource = "Univ. of California, Los Angeles, CA, USA", 19216 journalabr = "Commun ACM", 19217 keywords = "analysis; analysis of; biology computing; BMD; BMDP; cluster analysis; computing; contingency tables; data; data processing; discriminant analysis; factor analysis; graphics; mathematical statistics --- Computer Applications; outlines; regression; social and behavioural sciences; statistical analysis; statistical computer programs; statistics; time series; variance", 19218 treatment = "A Application; P Practical", 19219} 19220 19221@Article{Duong-Kien:1976:IMA, 19222 author = "C. Duong-Kien and H.-J. Hoffmann and D. Muth", 19223 title = "An improvement to {Martin}'s algorithm for computation of linear precedence functions", 19224 journal = j-CACM, 19225 volume = "19", 19226 number = "10", 19227 pages = "576--577", 19228 month = oct, 19229 year = "1976", 19230 CODEN = "CACMA2", 19231 ISSN = "0001-0782", 19232 MRclass = "68A30", 19233 MRnumber = "54 9176", 19234 mrreviewer = "Daniel J. Rosenkrantz", 19235 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19236 acknowledgement = ack-nhfb, 19237 classcodes = "C4210 (Formal logic)", 19238 corpsource = "Tech. Hochschule Darmstadt, Darmstadt, West Germany", 19239 keywords = "Boolean; Boolean algebra; linear precedence functions; matrices; syntax analysis", 19240 treatment = "T Theoretical or Mathematical", 19241} 19242 19243@Article{Montanelli:1976:SWM, 19244 author = "Richard G. {Montanelli, Jr.} and Sandra A. Mamrak", 19245 title = "Status of Women and Minorities in Academic Computer Science", 19246 journal = j-CACM, 19247 volume = "19", 19248 number = "10", 19249 pages = "578--581", 19250 month = oct, 19251 year = "1976", 19252 CODEN = "CACMA2", 19253 ISSN = "0001-0782", 19254 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19255 bibsource = "Compendex database", 19256 abstract = "The results of a survey concerning women and minority students and faculty in computer science during the years 1971 to 1975 are presented. Analysis of the data indicates that effective affirmative action programs for recruitment into graduate degree programs are needed to enlarge the number of women and minorities qualified for later employment in computer science. Also, possible discrimination in employment of women and minority graduate students is revealed.", 19257 acknowledgement = ack-nhfb, 19258 classcodes = "C0220 (Computing education and training)", 19259 classification = "723; 901", 19260 corpsource = "Dept. of Computer Sci., Univ. of Illinois, Urbana, IL, USA", 19261 journalabr = "Commun ACM", 19262 keywords = "academic employment; affirmative action; computer programming; computer science; computer science education; data processing; discrimination against; discrimination against women; education; employment; faculty; graduate students; minorities", 19263 treatment = "P Practical", 19264} 19265 19266@Article{Ross:1976:HHS, 19267 author = "D. T. Ross", 19268 title = "Homilies for humble standards (computer applications)", 19269 journal = j-CACM, 19270 volume = "19", 19271 number = "11", 19272 pages = "595--600", 19273 month = nov, 19274 year = "1976", 19275 CODEN = "CACMA2", 19276 ISSN = "0001-0782", 19277 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19278 acknowledgement = ack-nhfb, 19279 classcodes = "C0310 (EDP management); C7000 (Computer applications)", 19280 corpsource = "SofTech. Inc., Waltham, MA, USA", 19281 keywords = "computer applications; standards; systems methodology", 19282 treatment = "P Practical", 19283} 19284 19285@Article{Ledgard:1976:CUC, 19286 author = "Henry F. Ledgard and William C. Cave", 19287 title = "{Cobol} Under Control", 19288 journal = j-CACM, 19289 volume = "19", 19290 number = "11", 19291 pages = "601--608", 19292 month = nov, 19293 year = "1976", 19294 CODEN = "CACMA2", 19295 ISSN = "0001-0782", 19296 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19297 bibsource = "Compendex database", 19298 abstract = "A sample set of Cobol programming standards is offered. These standards constrain code to be developed in a ``structured'' form for both data and control structures. They do not require syntax beyond the existing Cobol language and in fact utilize a typical limited subset of the 1974 ANS Cobol standard. This approach has reduced the cost and time to produce and maintain large software systems.", 19299 acknowledgement = ack-nhfb, 19300 classcodes = "C6110 (Systems analysis and programming); C6140D (High level languages)", 19301 classification = "723; 912", 19302 corpsource = "Univ. of Massachusetts, Amherst, MA, USA", 19303 journalabr = "Commun ACM", 19304 keywords = "COBOL; computer programming --- Structured Programming; computer programming languages; computer programs --- Standardization; control structures; data structure; live; management; multiple customer environments; programming standards; sample set; standards; structured programming", 19305 treatment = "P Practical", 19306} 19307 19308@Article{Wilcox:1976:DIT, 19309 author = "Thomas R. Wilcox and Alan M. Davis and Michael H. Tindall", 19310 title = "Design and Implementation of a Table Driven, Interactive Diagnostic Programming System", 19311 journal = j-CACM, 19312 volume = "19", 19313 number = "11", 19314 pages = "609--616", 19315 month = nov, 19316 year = "1976", 19317 CODEN = "CACMA2", 19318 ISSN = "0001-0782", 19319 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19320 bibsource = "Compendex database", 19321 abstract = "CAPS is a highly interactive diagnostic compiler\slash interpreter that allows beginning programmers to prepare, debug, and execute fairly simple programs at a graphics display terminal. Complete syntax checking and most semantic analysis is performed as the program is entered and as it is subsequently edited. Analysis is performed character by character. The most remarkable feature of CAPS is its ability to automatically diagnose errors both at compile time and at run time. Errors are not automatically corrected. Instead, CAPS interacts with the student to help him find the cause of his error. Most components of CAPS are table driven, both to reduce the space needed for implementation and to increase the flexibility of the multilingual system. Over 500 students have used CAPS to learn Fortran, PL/I, or Cobol in conjunction with a computer assisted course on introductory computer science.", 19322 acknowledgement = ack-nhfb, 19323 classcodes = "C0220 (Computing education and training); C6110 (Systems analysis and programming); C6150C (Compilers, interpreters and other processors)", 19324 classification = "722; 723; 901", 19325 corpsource = "Univ. of Illinois, Urbana-Champaign, IL, USA", 19326 journalabr = "Commun ACM", 19327 keywords = "caps; CAPS; compiler/interpreter; compilers; computer operating systems --- Program Compilers; computer programming languages --- Procedure Orientation; computer science education; computer systems, digital; data processing --- Educational Applications; design; education --- Computer Applications; implementation; interactive diagnostic; interactive programming; Plato IV; program; program interpreters; programming system; student; table driven", 19328 treatment = "P Practical", 19329} 19330 19331@Article{Rubin:1976:ETF, 19332 author = "Frank Rubin", 19333 title = "Experiments in Text File Compression", 19334 journal = j-CACM, 19335 volume = "19", 19336 number = "11", 19337 pages = "617--623 (or 617--622??)", 19338 month = nov, 19339 year = "1976", 19340 CODEN = "CACMA2", 19341 ISSN = "0001-0782", 19342 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19343 bibsource = "Compendex database", 19344 abstract = "A system for the compression of data files, viewed as strings of characters, is presented. \par The method is general, and applies equally well to English, to PL/I, or to digital data. The system consists of an encoder, an analysis program, and a decoder. \par Two algorithms for encoding a string differ slightly from earlier proposals. The analysis program attempts to find an optimal set of codes for representing substrings of the file. Four new algorithms for this operation are described and compared. Various parameters in the algorithms are optimized to obtain a high degree of compression for sample texts.", 19345 acknowledgement = ack-nhfb, 19346 classcodes = "C6130 (Data handling techniques)", 19347 classification = "723", 19348 corpsource = "IBM, Poughkeepsie, NY, USA", 19349 journalabr = "Commun ACM", 19350 keywords = "analysis program; comparison of algorithms; computer programming --- Subroutines; data file compaction; data processing; decoder; encoder; Huffman codes; N-gram encoding; strings of characters; text compression; text editing; text file compression", 19351 treatment = "P Practical; X Experimental", 19352} 19353 19354@Article{Eswaran:1976:NCP, 19355 author = "K. P. Eswaran and J. N. Gray and R. A. Lorie and I. L. Traiger", 19356 title = "The notions of consistency and predicate locks in a database system", 19357 journal = j-CACM, 19358 volume = "19", 19359 number = "11", 19360 pages = "624--633", 19361 month = nov, 19362 year = "1976", 19363 CODEN = "CACMA2", 19364 ISSN = "0001-0782", 19365 MRclass = "68A50", 19366 MRnumber = "57 2005", 19367 mrreviewer = "W. W. Armstrong", 19368 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19369 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 19370 note = "Also published in/as: IBM Research Report RJ1487, San Jose, CA, December, 1974.", 19371 abstract = "In database systems, users access shared data under the assumption that the data satisfies certain consistency constraints. This paper defines the concepts of transaction, consistency and schedule and shows that consistency requires that a transaction cannot request new locks after releasing a lock. Then it is argued that a transaction needs to lock a logical rather than a physical subset of the database. These subsets may be specified by predicates. An implementation of predicate locks which satisfies the consistency condition is suggested.", 19372 acknowledgement = ack-nhfb, 19373 annote = "If transactions are well-formed (they obtain and release all locks required to avoid conflicts) and 2-phase (they don't obtain locks after having released one), they maintain consistency. Original 2-phase protocol. Serializability? Definitions of transactions, permissible locking sequence in transactions, the importance and complexity of predicate locks. Two-phase transactions.", 19374 classcodes = "C6120 (File organisation); C7100 (Business and administration)", 19375 classification = "723; 913", 19376 corpsource = "IBM Res. Lab., San Jose, CA, USA", 19377 journalabr = "Commun ACM", 19378 keywords = "computer operating systems --- Scheduling; computer systems programming --- Multiprocessing Programs; consistency; data base systems; database management systems; database system; predicate locks; relation database IBM San Jose CACM; schedule; shared data; transaction", 19379 treatment = "P Practical", 19380} 19381 19382@Article{Maruyama:1976:ORD, 19383 author = "K. Maruyama and S. E. Smith", 19384 title = "Optimal Reorganization of Distributed Space Disk Files", 19385 journal = j-CACM, 19386 volume = "19", 19387 number = "11", 19388 pages = "634--642", 19389 month = nov, 19390 year = "1976", 19391 CODEN = "CACMA2", 19392 ISSN = "0001-0782", 19393 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19394 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Os/storage.bib", 19395 abstract = "A basic problem in database maintenance is to establish the proper tradeoff between performance, storage costs, and reorganization costs. This paper considers the optimum points at which to reorganize database. A disk file organization which allows for distributed free space is described. The file is called a DSDF (Distributed Space Disk File). A cost function describing the excess costs due to physical disorganization is defined, and this function is minimized to obtain the optimum reorganization points. Numerical examples based on the characteristics of existing disk storage devices are given.", 19396 acknowledgement = ack-nhfb, 19397 classcodes = "C6120 (File organisation)", 19398 classification = "722; 723; 901", 19399 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 19400 journalabr = "Commun ACM", 19401 keywords = "accessing; cost; data base systems --- Optimization; data processing --- File Organization; data storage, magnetic; database organizations; disc files; distributed space; DSDF; file organisation; information retrieval systems; insertions; magnetic disc and drum storage; memory hierarchy; performance; reorganizing; updates", 19402 treatment = "P Practical", 19403} 19404 19405@Article{Hamlet:1976:HBL, 19406 author = "Richard G. Hamlet", 19407 title = "High-Level Binding with Low-Level Linkers", 19408 journal = j-CACM, 19409 volume = "19", 19410 number = "11", 19411 pages = "642--644", 19412 month = nov, 19413 year = "1976", 19414 CODEN = "CACMA2", 19415 ISSN = "0001-0782", 19416 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19417 bibsource = "Compendex database", 19418 abstract = "An easy to implement scheme is described by which a compiler can enforce agreement between complex data types in separately compiled modules. The scheme is designed to work with any existing link editor or linking loader, no matter how deficient. Obscure run-time errors caused by inconsistent usages are forestalled by static errors detected at linking time.", 19419 acknowledgement = ack-nhfb, 19420 classcodes = "C6150C (Compilers, interpreters and other processors)", 19421 classification = "723", 19422 corpsource = "Univ. of Maryland, College Park, MD, USA", 19423 journalabr = "Commun ACM", 19424 keywords = "agreement; compiler; complex data types; computer operating systems; computer programming languages; high level binding; link editor; low level linkers; modules; program compilers; separately compiled", 19425 treatment = "P Practical", 19426} 19427 19428@Article{Sammet:1976:RPL, 19429 author = "Jean E. Sammet", 19430 title = "Roster of Programming Languages for 1974--75", 19431 journal = j-CACM, 19432 volume = "19", 19433 number = "12", 19434 pages = "655--669", 19435 month = dec, 19436 year = "1976", 19437 CODEN = "CACMA2", 19438 ISSN = "0001-0782", 19439 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19440 bibsource = "Compendex database", 19441 abstract = "This roster contains a list of 167 currently existing higher-level languages which have been developed or reported in the United States; have been implemented on at least one general-purpose computer; and are believed to be in use in the United States by someone other than the developer. A programming ( equals higher-level) language is defined as a set of characters and rules for combining them which has the following characteristics: the language requires no knowledge of machine code by the user; the language is significantly independent of a particular computer; there is a one-many translation of instructions from source code to object code; and the notation of the language is fairly natural to its problem area and is not a fixed tabular format. Of the total of 167 languages, 79 are in categories: numerical scientific, business data processing, list processing, string processing, formula manipulation, and multipurpose. The remaining 88 are in various specialized application areas.", 19442 acknowledgement = ack-nhfb, 19443 classcodes = "C6140D (High level languages)", 19444 classification = "723", 19445 corpsource = "IBM, Cambridge, MA, USA", 19446 journalabr = "Commun ACM", 19447 keywords = "computer programming; computer programming languages; higher level language; programming languages", 19448 treatment = "G General Review; P Practical", 19449} 19450 19451@Article{Arden:1976:CSE, 19452 author = "Bruce W. Arden", 19453 title = "The Computer Science and Engineering Research Study ({COSERS})", 19454 journal = j-CACM, 19455 volume = "19", 19456 number = "12", 19457 pages = "670--673", 19458 month = dec, 19459 year = "1976", 19460 CODEN = "CACMA2", 19461 ISSN = "0001-0782", 19462 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19463 bibsource = "Compendex database", 19464 abstract = "The Computer Science and Engineering Research Study (COSERS) is briefly described. The motivation, organization, and schedule for this NSF supported study are given. For possible further reference, the subject area panel chairmen and the members of the Steering Committee are identified.", 19465 acknowledgement = ack-nhfb, 19466 classcodes = "C0310 (EDP management)", 19467 classification = "901; 912", 19468 corpsource = "Princeton Univ., Princeton, NJ, USA", 19469 journalabr = "Commun ACM", 19470 keywords = "computer engineering research; computer science research; computers --- Research; COSERS; engineering research; national research study; research and development management", 19471 treatment = "P Practical", 19472} 19473 19474@Article{Nunamaker:1976:CAD, 19475 author = "J. F. {Nunamaker, Jr.} and Benn R. {Konsynski, Jr.} and Thomas Ho and Carl Singer", 19476 title = "Computer-Aided Analysis and Design of Information Systems", 19477 journal = j-CACM, 19478 volume = "19", 19479 number = "12", 19480 pages = "674--687", 19481 month = dec, 19482 year = "1976", 19483 CODEN = "CACMA2", 19484 ISSN = "0001-0782", 19485 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19486 bibsource = "Compendex database", 19487 abstract = "This paper describes the use of computer-aided analysis for the design and development of an integrated financial management system by the Navy Material Command Support Activity (NMCSA). Computer-aided analysis consists of a set of procedures and computer programs specifically designed to aid in the process of applications software design, computer selection and performance evaluation. There are four major components: Problem Statement Language, Problem Statement Analyzer, Generator of Alternative Designs, and Performance Evaluator. The statement of requirements was written in ADS (Accurately Defined Systems) and analyzed by a Problem Statement Analyzer for ADS. The analyzed problem statement was translated to the form necessary for use by the SODA (Systems Optimization and Design Algorithm) program for the generation of alternative specifications of program modules and logical database structures.", 19488 acknowledgement = ack-nhfb, 19489 classcodes = "B7900 (Military systems and equipment); B7990 (Other military topics); C6110 (Systems analysis and programming); C7120 (Financial computing); C7150 (Military computing)", 19490 classification = "723; 901", 19491 corpsource = "Univ. of Arizona, Tucson, AZ, USA", 19492 journalabr = "Commun ACM", 19493 keywords = "accurately defined systems; ads; analysis; CAD; computer aided analysis; computer systems, digital --- Computer Aided Design; computer-aided analysis; data base systems --- Computer Aided Design; data processing --- Financial Applications; financial data processing; financial management system; information retrieval systems; information systems; integrated; logic design --- Computer Aids; logical database structures; management information systems; military computing; performance evaluator; problem statement analyser; problem statement language; soda; systems", 19494 treatment = "A Application; E Economic; P Practical", 19495} 19496 19497@Article{Stockman:1976:SPR, 19498 author = "George Stockman and Laveen Kanal and M. C. Kyle", 19499 title = "Structural Pattern Recognition of Carotid Pulse Waves Using a General Waveform Parsing System", 19500 journal = j-CACM, 19501 volume = "19", 19502 number = "12", 19503 pages = "688--695", 19504 month = dec, 19505 year = "1976", 19506 CODEN = "CACMA2", 19507 ISSN = "0001-0782", 19508 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19509 bibsource = "Compendex database", 19510 abstract = "A general waveform parsing system (WPS) with application to structural pattern recognition of carotid pulse waves is described. The carotid arterial pulse wave is of medical importance because of variation in its structure induced by arterial aging and cardiovascular disease. The syntax-driven waveform analysis system has been applied with good results to these pulse waves to detect and measure structural variations. The waveform applied with good results to these pulse waves to detect and measure structural variations. The waveform parsing system is modeled on a compiler-compiler system and allows the user to enter application specific information as data. It is thus general enough to be applicable to other waveforms.", 19511 acknowledgement = ack-nhfb, 19512 classcodes = "B6140C (Optical information, image and video signal processing); C1120 (Mathematical analysis); C1250 (Pattern recognition); C1290L (Systems theory applications in biology and medicine); C7330 (Biology and medical computing)", 19513 classification = "461; 721; 723", 19514 journalabr = "Commun ACM", 19515 keywords = "automata theory --- Context Free Languages; biomedical engineering --- Computer Aided Diagnosis; cardiovascular disease; carotid pulse waves; data processing --- Medical Information; medical computing; pattern recognition; pattern recognition systems; structural pattern recognition; waveform analysis; waveform parsing system", 19516 treatment = "T Theoretical or Mathematical", 19517} 19518 19519@Article{vanGelder:1977:SPC, 19520 author = "Allen {van Gelder}", 19521 title = "Structured programming in {COBOL}: an approach for application programmers", 19522 journal = j-CACM, 19523 volume = "20", 19524 number = "1", 19525 pages = "2--12", 19526 month = jan, 19527 year = "1977", 19528 CODEN = "CACMA2", 19529 ISSN = "0001-0782", 19530 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19531 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib", 19532 abstract = "Techniques for designing and writing Cobol programs are presented. Previous work in structured programming is drawn upon and adapted. The presentation is informal: the terminology is nonmathematical as far as possible, no theorems are proved, and examples are used frequently. Top-down program design is implemented through the use of structured flowcharts, disciplined specifications, and step by step verification. A well-formed Cobol program is defined. The proper use of the GO TO and other Cobol coding practices are discussed.", 19533 acknowledgement = ack-nhfb, 19534 classcodes = "C6110 (Systems analysis and programming); C6140D (High level languages)", 19535 classification = "723", 19536 corpsource = "ACM, Seattle, WA, USA", 19537 country = "USA", 19538 descriptors = "Program construction; COBOL; standard;", 19539 enum = "3174", 19540 journalabr = "Commun ACM", 19541 keywords = "application; application programming; COBOL; Cobol; computer metatheory --- Programming Theory; computer programming; computer programming languages --- Cobol; flowchart; GO TO; GO TO statement; program verification; programming; repeat statement; software reliability; structured flowcharts; structured programming; top down; top-down; well formed program; well-formed program", 19542 language = "English", 19543 references = "24", 19544 treatment = "P Practical", 19545} 19546 19547@Article{Austing:1977:SLC, 19548 author = "Richard H. Austing and Bruce H. Barnes and Gerald L. Engel", 19549 title = "A Survey of the Literature in Computer Science Education Since {Curriculum '68}", 19550 journal = j-CACM, 19551 volume = "20", 19552 number = "1", 19553 pages = "13--21", 19554 month = jan, 19555 year = "1977", 19556 CODEN = "CACMA2", 19557 ISSN = "0001-0782", 19558 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19559 bibsource = "Compendex database", 19560 abstract = "A bibliography of approximately two hundred references in computer science education appearing in the literature since the publication of ``Curriculum '68'' is presented. The bibliography itself is preceded by brief descriptive materials organizing the references into the categories of survey reports, activities of professional organizations, philosophy of programs, description of programs, description of courses and other materials.", 19561 acknowledgement = ack-nhfb, 19562 classcodes = "C0220 (Computing education and training)", 19563 classification = "723; 901; 912", 19564 corpsource = "ACM, Seattle, WA, USA", 19565 journalabr = "Commun ACM", 19566 keywords = "bibliography; computer science; computer science curricula; computer science education; computers; curricula; education; education --- Bibliographies", 19567 treatment = "B Bibliography", 19568} 19569 19570@Article{Babad:1977:RFP, 19571 author = "Jair M. Babad", 19572 title = "A Record and File Partitioning Model", 19573 journal = j-CACM, 19574 volume = "20", 19575 number = "1", 19576 pages = "22--31 (or 22--30??)", 19577 month = jan, 19578 year = "1977", 19579 CODEN = "CACMA2", 19580 ISSN = "0001-0782", 19581 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19582 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 19583 abstract = "This paper presents a model in which several requests access a file system, and each request requires information from one or more variable length data-items. The file system uses one or more storage devices, and each record may be partitioned into subrecords that are stored on different devices. One of the subrecords is designated as the primary record; when a request for a record is made, the primary record is first accessed, and other subrecords are accessed only if the pertinent information is not stored in the primary record. The model that is presented in this paper, both as a nonlinear programming model and a mixed integer programming model, is a very general one; several types of file systems may be derived from it by an appropriate selection of its parameters. This model has already been used in the optimization of library routines' storage at a large scale operating system.", 19584 acknowledgement = ack-nhfb, 19585 classcodes = "C6120 (File organisation)", 19586 classification = "722; 723; 901; 921", 19587 corpsource = "Univ. of Chicago, Chicago, IL, USA", 19588 journalabr = "Commun ACM", 19589 keywords = "data processing; data storage, digital --- Mathematical Models; file design; file organisation; file partitioning; file systems; information retrieval systems --- Optimization; integer programming; integer programming model; mixed; nonlinear; nonlinear programming model; partitioning; programming; record", 19590 treatment = "A Application; P Practical; T Theoretical or Mathematical", 19591} 19592 19593@Article{Zobrist:1977:DCO, 19594 author = "Albert L. Zobrist and Frederick R. {Carlson, Jr.}", 19595 title = "Detection of Combined Occurrences", 19596 journal = j-CACM, 19597 volume = "20", 19598 number = "1", 19599 pages = "31--36 (or 31--35??)", 19600 month = jan, 19601 year = "1977", 19602 CODEN = "CACMA2", 19603 ISSN = "0001-0782", 19604 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19605 bibsource = "Compendex database", 19606 abstract = "In this paper it is supposed that the variables x//1,\ldots{},x//n each have finite range with the variable x//i taking on p//i possible values and that the values of the variables are changing with time. It is supposed further that it is desired to detect occurrences in which some subset of the variables achieve particular values. Finally, it is supposed that the problem involves the detection of a large number of combined occurrences for a large number of changes of values of variables. Two efficient solutions for this problem are described. Both methods have the unusual property of being faster for systems where the sum p//1 plus\ldots{} plus p//n is larger. A chess playing application of the second solution algorithm is provided.", 19607 acknowledgement = ack-nhfb, 19608 classcodes = "C4240 (Programming and algorithm theory); C6110 (Systems analysis and programming); C6130 (Data handling techniques)", 19609 classification = "461; 723; 912", 19610 corpsource = "Jet Propulsion Lab., Pasadena, CA, USA", 19611 journalabr = "Commun ACM", 19612 keywords = "$n$ tuples; artificial; artificial intelligence; chess; coding; combined occurrences; computer programming; error analysis; hash coding; intelligence; pattern recognition; pattern recognition systems; programming; retrieval; secondary keys; sorting; systems science and cybernetics --- Artificial Intelligence; theory", 19613 treatment = "P Practical; T Theoretical or Mathematical", 19614} 19615 19616@Article{Batson:1977:SSL, 19617 author = "A. P. Batson and R. E. Brundage", 19618 title = "Segment Sizes and Lifetimes in {Algol 60} Programs", 19619 journal = j-CACM, 19620 volume = "20", 19621 number = "1", 19622 pages = "36--44", 19623 month = jan, 19624 year = "1977", 19625 CODEN = "CACMA2", 19626 ISSN = "0001-0782", 19627 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19628 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Heaps.bib", 19629 abstract = "The characteristics of the virtual memory requirements of a sample of Algol 60 programs have been measured. Distributions are presented for the sizes of memory requests and for their holding times (lifetimes). The results are presented in terms of J. B. Johnston's contour model and a simple abstract machine. They provide new empirical evidence of certain aspects of the construction and behavior of real programs, and some of their implications for the design of virtual memory systems are presented and discussed.", 19630 acknowledgement = ack-nhfb, 19631 classcodes = "C6120 (File organisation)", 19632 classification = "722; 723", 19633 corpsource = "Univ. of Virginia, Charlottesville, VA, USA", 19634 journalabr = "Commun ACM", 19635 keywords = "abstract; ALGOL; ALGOL 60; computer operating systems --- Storage Allocation; computer programming languages --- Algol; computer systems, digital; data storage, digital; Johnston's contour model; machine; program behaviour; segmentation; storage allocation; virtual memory; virtual storage", 19636 treatment = "P Practical", 19637} 19638 19639@Article{Gries:1977:BPB, 19640 author = "David Gries", 19641 title = "On Believing Programs to be Correct", 19642 journal = j-CACM, 19643 volume = "20", 19644 number = "1", 19645 pages = "49--50", 19646 month = jan, 19647 year = "1977", 19648 CODEN = "CACMA2", 19649 ISSN = "0001-0782", 19650 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 19651} 19652 19653@Article{Muller:1977:AMD, 19654 author = "Mervin E. Muller", 19655 title = "An Approach to Multidimensional Data Array Processing by Computer", 19656 journal = j-CACM, 19657 volume = "20", 19658 number = "2", 19659 pages = "63--77", 19660 month = feb, 19661 year = "1977", 19662 CODEN = "CACMA2", 19663 ISSN = "0001-0782", 19664 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19665 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 19666 abstract = "Attention is first given to some of the general problems of multidimensional table and array processing. This is followed by a summary of some recent developments in array processing capabilities at the World Bank, in particular, the system identified as WRAPS (World Bank Retrieval and Array Processing System).", 19667 acknowledgement = ack-nhfb, 19668 classcodes = "C6130 (Data handling techniques)", 19669 classification = "723; 901", 19670 journalabr = "Commun ACM", 19671 keywords = "array processing; arrays; computer; data processing; information retrieval systems; multidimensional data; table lookup; World Bank Retrieval and Array Processing System; WRAPS; wraps", 19672 treatment = "P Practical", 19673} 19674 19675@Article{Clark:1977:ESL, 19676 author = "Douglas W. Clark and C. Cordell Green", 19677 title = "An Empirical Study of List Structure in {LISP}", 19678 journal = j-CACM, 19679 volume = "20", 19680 number = "2", 19681 pages = "78--87", 19682 month = feb, 19683 year = "1977", 19684 CODEN = "CACMA2", 19685 ISSN = "0001-0782", 19686 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19687 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 19688 abstract = "Static measurements of the list structure of five large Lisp programs are reported and analyzed. These measurements reveal substantial regularity, or predictability, among pointers to atoms and especially among pointers to lists. Pointers to atoms are found to obey, roughly, Zipf's law, which governs word frequencies in natural languages; pointers to lists usually point to a location physically nearby in memory. The use of such regularities in the space-efficient representation of list structure is discussed.", 19689 acknowledgement = ack-nhfb, 19690 classcodes = "C6130 (Data handling techniques); C6140D (High level languages)", 19691 classification = "723", 19692 comment = "Great paper; evidence pro CDR-coding, con fancy CONS", 19693 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 19694 journalabr = "Commun ACM", 19695 keywords = "computer programming languages; data processing --- Data Structures; empirical study; LISP; list structure; measurements; regularity", 19696 treatment = "P Practical", 19697} 19698 19699@Article{Preparata:1977:CHF, 19700 author = "F. P. Preparata and S. J. Hong", 19701 title = "Convex Hulls of Finite Sets of Points in Two and Three Dimensions", 19702 journal = j-CACM, 19703 volume = "20", 19704 number = "2", 19705 pages = "87--93", 19706 month = feb, 19707 year = "1977", 19708 CODEN = "CACMA2", 19709 ISSN = "0001-0782", 19710 MRclass = "68A10 (52A25)", 19711 MRnumber = "58 8475", 19712 mrreviewer = "V. Medek", 19713 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19714 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/77.bib", 19715 abstract = "The convex hulls of sets of n points in two and three dimensions can be determined with O(n log n) operations. The presented algorithms use the ``divide and conquer'' technique and recursively apply a merge procedure for two nonintersecting convex hulls. Since any convex hull algorithm requires at least O(n log n) operations, the time complexity of the proposed algorithms is optimal within a multiplicative constant.", 19716 acknowledgement = ack-nhfb, 19717 annote = "$O(n \log n)$ time", 19718 classcodes = "C6130B (Graphics techniques)", 19719 classification = "723; 931", 19720 corpsource = "Univ. of Illinois, Urbana-Champaign, IL, USA", 19721 journalabr = "Commun ACM", 19722 keywords = "complexity; computational complexity; computer graphics; computer programming; convex hull algorithm; divide-and-conquer; finite sets of points; structural analysis --- Computer Applications; time; worst-case analysis", 19723 treatment = "A Application; T Theoretical or Mathematical", 19724} 19725 19726@Article{Easton:1977:TFW, 19727 author = "M. C. Easton and B. T. Bennett", 19728 title = "Transient-Free Working-Set Statistics", 19729 journal = j-CACM, 19730 volume = "20", 19731 number = "2", 19732 pages = "93--99", 19733 month = feb, 19734 year = "1977", 19735 CODEN = "CACMA2", 19736 ISSN = "0001-0782", 19737 MRclass = "68A20", 19738 MRnumber = "58 25108", 19739 mrreviewer = "A. D. Booth", 19740 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19741 bibsource = "Compendex database", 19742 abstract = "Transient free-average working-set size and transient-free missing-page rate for a finite sample of a reference string are defined. Use of these statistics is appropriate if the contents of the working set at the start of the recorded string are unknown. If a certain stationarity condition holds, these statistics provide unbiased estimates of expected working-set sizes, missing-page probabilities, and interference distance probabilities. Two other pairs of estimators are shown to be biased. Expressions for the transient-free statistics are obtained in terms of interval statistics. Methods are described for handling long strings containing many distinct page names.", 19743 acknowledgement = ack-nhfb, 19744 classcodes = "C4240 (Programming and algorithm theory); C6110 (Systems analysis and programming)", 19745 classification = "723; 922", 19746 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 19747 journalabr = "Commun ACM", 19748 keywords = "computer operating systems; statistical methods", 19749 keywords = "missing page rate; programming; statistics; transient free; working set", 19750 treatment = "A Application; T Theoretical or Mathematical", 19751} 19752 19753@Article{Bresenham:1977:LAI, 19754 author = "Jack Bresenham", 19755 title = "A Linear Algorithm for Incremental Digital Display of Circular Arcs", 19756 journal = j-CACM, 19757 volume = "20", 19758 number = "2", 19759 pages = "100--106", 19760 month = feb, 19761 year = "1977", 19762 CODEN = "CACMA2", 19763 ISSN = "0001-0782", 19764 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19765 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.77.bib", 19766 abstract = "Circular arcs can be drawn on an incremental display device such as a cathode ray tube, digital plotter, or matrix printer using only sign testing and elementary addition and subtraction. This paper describes methodology for producing dot or step patterns closest to the true circle.", 19767 acknowledgement = ack-nhfb, 19768 classcodes = "C6130B (Graphics techniques)", 19769 classification = "723", 19770 corpsource = "IBM System Communications Div., Palo Alto, CA, USA", 19771 journalabr = "Commun ACM", 19772 keywords = "addition; arc generation; arcs; circle drawing; circular; computer graphics; computer programming --- Subroutines; dot generation; imaging techniques; incremental digital display; linear algorithm; raster display; sign testing; subtraction", 19773 treatment = "P Practical", 19774} 19775 19776@Article{Kotiah:1977:OCO, 19777 author = "Thoddi C. T. Kotiah and David I. Steinberg", 19778 title = "Occurrences of Cycling and Other Phenomena Arising in a Class of Linear Programming Models", 19779 journal = j-CACM, 19780 volume = "20", 19781 number = "2", 19782 pages = "107--112", 19783 month = feb, 19784 year = "1977", 19785 CODEN = "CACMA2", 19786 ISSN = "0001-0782", 19787 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19788 bibsource = "Compendex database", 19789 abstract = "An investigation into the average queue size for a certain class of queues has resulted in the formulation of linear programming problems which are ill-conditioned in some cases. In attempting to solve these linear programming models, using IBM's MPS package, instances of cycling were encountered. Small perturbations in the input data resulted in problems which did not cycle. This fact, plus several other observed phenomena suggest that the primary reason that cycling is not known to occur more frequently is that round-off errors in the computations perturb the problem sufficiently to prevent cycling (or at least to prevent indefinite cycling).", 19790 acknowledgement = ack-nhfb, 19791 classcodes = "C1140C (Queueing theory); C1180 (Optimisation techniques)", 19792 classification = "723; 921; 922", 19793 corpsource = "Southern Illinois Univ., Edwardsville, IL, USA", 19794 journalabr = "Commun ACM", 19795 keywords = "average queue size; cycling; linear programming; mathematical programming, linear; MPS package; phenomena; probability --- Queueing Theory; queueing theory", 19796 treatment = "T Theoretical or Mathematical", 19797} 19798 19799@Article{Knott:1977:NSB, 19800 author = "Gary D. Knott", 19801 title = "A Numbering System for Binary Trees", 19802 journal = j-CACM, 19803 volume = "20", 19804 number = "2", 19805 pages = "113--115", 19806 month = feb, 19807 year = "1977", 19808 CODEN = "CACMA2", 19809 ISSN = "0001-0782", 19810 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19811 acknowledgement = ack-nhfb, 19812 classcodes = "B0250 (Combinatorial mathematics); C1160 (Combinatorial mathematics); C4240 (Programming and algorithm theory)", 19813 corpsource = "Nat. Inst. of Health, Bethesda, MD, USA", 19814 keywords = "binary search trees; binary trees; numbering system; permutations; ranking function; trees (mathematics)", 19815 treatment = "T Theoretical or Mathematical", 19816} 19817 19818@Article{Clapson:1977:IAT, 19819 author = "Philip Clapson", 19820 title = "Improving the Access Time for Random Access Files", 19821 journal = j-CACM, 19822 volume = "20", 19823 number = "3", 19824 pages = "127--135", 19825 month = mar, 19826 year = "1977", 19827 CODEN = "CACMA2", 19828 ISSN = "0001-0782", 19829 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19830 bibsource = "Compendex database", 19831 abstract = "Clustering in the key set is decreased by smoothing the key-to-address transformation, and by adding shadow buckets to an open chaining file. The keys are pre-hashed before the address division, to remove the effect of sequential properties in the key set. Shadow buckets in the key search sequence reduce the effect of nonuniformity in file loading, and decrease the number of maximum probes needed to locate a record. The combined effects of these techniques lead to improved file performance for secondary storage devices, as shown by empirical studies.", 19832 acknowledgement = ack-nhfb, 19833 classcodes = "C6120 (File organisation)", 19834 classification = "723; 901", 19835 corpsource = "IBM United Kingdom Ltd., Feltham, UK", 19836 journalabr = "Commun ACM", 19837 keywords = "access time; chaining file; data processing --- File Organization; data storage, digital; file loading; file organisation; improved file; information retrieval systems --- Design; key search sequence; maximum probes; nonuniformity; open; performance; random access files; secondary storage devices; sequential properties; shadow buckets", 19838 treatment = "P Practical", 19839} 19840 19841@Article{Yu:1977:EIR, 19842 author = "C. T. Yu and G. Salton", 19843 title = "Effective Information Retrieval Using Term Accuracy", 19844 journal = j-CACM, 19845 volume = "20", 19846 number = "3", 19847 pages = "135--142", 19848 month = mar, 19849 year = "1977", 19850 CODEN = "CACMA2", 19851 ISSN = "0001-0782", 19852 MRclass = "68A50", 19853 MRnumber = "55 7012", 19854 mrreviewer = "Fujio Nishida", 19855 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19856 bibsource = "Compendex database", 19857 abstract = "Evaluation of a retrieval system in this study is based on optimizing the performance of a specific user query. The concept of query term accuracy is introduced as the probability of occurrence of a query term in the documents relevant to that query. By relating term accuracy to the frequency of occurrence of the term in the documents of a collection it is possible to give formal proofs of the effectiveness with respect to a given user query of a number of automatic indexing systems that have been used successfully in experimental situations. Among these are inverse document frequency weighting, thesaurus construction, and phrase generation.", 19858 acknowledgement = ack-nhfb, 19859 classcodes = "C7250 (Information storage and retrieval)", 19860 classification = "723; 901", 19861 corpsource = "Univ. of Alberta, Edmonton, Alta., Canada", 19862 journalabr = "Commun ACM", 19863 keywords = "automatic indexing; concept; evaluation; formal proofs; information retrieval; information retrieval system evaluation; information retrieval systems; information science --- Indexing; performance; query term accuracy", 19864 treatment = "T Theoretical or Mathematical", 19865} 19866 19867@Article{Lunde:1977:EES, 19868 author = "Amund Lunde", 19869 title = "Empirical Evaluation of Some Features of Instruction Set Processor Architectures", 19870 journal = j-CACM, 19871 volume = "20", 19872 number = "3", 19873 pages = "143--153", 19874 month = mar, 19875 year = "1977", 19876 CODEN = "CACMA2", 19877 ISSN = "0001-0782", 19878 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19879 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/risc.bib", 19880 abstract = "This paper presents methods for empirical evaluation of features of Instruction Set Processors (ISPs). ISP features are evaluated in terms of the time used or saved by having or not having the feature. \par The methods are based on analysis of traces of program executions. The concept of a register life is in troduced, and used to answer questions like: How many registers are used simultaneously? How many would be sufficient all of the time? Most of the time? What would the overhead be if the number of registers were reduced? What are registers used for during their lives? The paper also discusses the problem of detecting desirable but non-existing instructions. Other problems are briefly discussed. Experimental results are presented, obtained by analyzing 41 programs running on the DEC system 10 ISP.", 19881 acknowledgement = ack-nhfb, 19882 classcodes = "C5220 (Computer architecture); C6150G (Diagnostic, testing, debugging and evaluating systems)", 19883 classification = "722; 723", 19884 corpsource = "Carnegie-Mellon Univ., Pittsburg, PA, USA", 19885 journalabr = "Commun ACM", 19886 keywords = "architectures; computer architecture; computer programming languages --- Machine Orientation; computer selection and evaluation; computers, digital --- General Purpose Application; evaluation; execution time; instruction set processor; instruction sets; instruction tracing; microcoding; MIPS; op code utilization; pipelining; program behavior; reduced; register life; register structures; register utilization; restricted instruction set computer architecture; RISC; simultaneous register lives", 19887 treatment = "A Application; T Theoretical or Mathematical", 19888} 19889 19890@Article{Brown:1977:MMR, 19891 author = "R. M. Brown and J. C. Browne and K. M. Chandy", 19892 title = "Memory Management and Response Time", 19893 journal = j-CACM, 19894 volume = "20", 19895 number = "3", 19896 pages = "153--165", 19897 month = mar, 19898 year = "1977", 19899 CODEN = "CACMA2", 19900 ISSN = "0001-0782", 19901 MRclass = "68A50 (60K30)", 19902 MRnumber = "55 6996", 19903 mrreviewer = "Jacek Blazewicz", 19904 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19905 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/simulan.bib", 19906 abstract = "This paper presents a methodology for including the effects of finite memory size and workload memory requirements in queueing network models of computer systems. Empirical analyses and analytic studies based on applying this methodology to an actual multiaccess interactive system are reported. A multiphase, analytically soluble model is proposed as being broadly applicable to the analysis of interactive computer systems which use nonpaged memories.", 19907 acknowledgement = ack-nhfb, 19908 classcodes = "C6120 (File organisation)", 19909 classification = "722; 723; 922", 19910 corpsource = "Univ. of Texas, Austin, TX, USA", 19911 journalabr = "Commun ACM", 19912 keywords = "computer operating systems --- Storage Allocation; computer systems, digital; distribution; interactive computer; job swap time; memory; memory requirement; model; multi-access systems; multiphase; nonpaged memories; performance measures; probability --- Queueing Theory; response time; storage management; systems; utilization; workload variables", 19913 treatment = "T Theoretical or Mathematical", 19914} 19915 19916@Article{Burton:1977:RMS, 19917 author = "Warren Burton", 19918 title = "Representation of Many-Sided Polygons and Polygonal Lines for Rapid Processing", 19919 journal = j-CACM, 19920 volume = "20", 19921 number = "3", 19922 pages = "166--171", 19923 month = mar, 19924 year = "1977", 19925 CODEN = "CACMA2", 19926 ISSN = "0001-0782", 19927 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19928 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/siggraph/77.bib", 19929 abstract = "A representation for polygons and polygonal lines is described which allows sets of consecutive sides to be collectively examined. The sets of sides are arranged in a binary tree hierarchy by inclusion. A fast algorithm for testing the inclusion of a point in a many-sided polygon is given. It is shown that the points of intersection of two polygonal lines can be located by what is essentially a binary tree search. The algorithm and a practical example are discussed.", 19930 acknowledgement = ack-nhfb, 19931 classcodes = "C6130B (Graphics techniques)", 19932 classification = "723; 921", 19933 corpsource = "Michigan Tech. Univ., Houghton, MI, USA", 19934 journalabr = "Commun ACM", 19935 keywords = "computer programming --- Subroutines; data processing --- Natural Sciences Applications; image processing; mathematical techniques --- Trees", 19936 keywords = "binary tree hierarchy; computer graphics; fast algorithm; inclusion; polygonal lines; polygons; rapid processing; representation; speed", 19937 treatment = "A Application; T Theoretical or Mathematical", 19938} 19939 19940@Article{Hunt:1977:OSR, 19941 author = "H. B. {Hunt, III} and T. G. Szymanski and J. D. Ullman", 19942 title = "Operations on Sparse Relations", 19943 journal = j-CACM, 19944 volume = "20", 19945 number = "3", 19946 pages = "171--176", 19947 month = mar, 19948 year = "1977", 19949 CODEN = "CACMA2", 19950 ISSN = "0001-0782", 19951 MRclass = "68A20 (68A30)", 19952 MRnumber = "55 4774", 19953 mrreviewer = "Armin Cremers", 19954 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19955 bibsource = "Compendex database", 19956 abstract = "Various computations on relations, Boolean matrices, or directed graphs, such as the computation of precedence relations for a context-free grammar, can be done by a practical algorithm that is asymptotically faster than those in common use. The heart of the algorithms is a general theorem giving sufficient conditions under which an expression whose operands are sparse relations and whose operators are composition, transitive closure, union, and inverse, can be computed efficiently.", 19957 acknowledgement = ack-nhfb, 19958 classcodes = "C4210 (Formal logic)", 19959 classification = "721; 723", 19960 corpsource = "Harvard Univ., Cambridge, MA, USA", 19961 journalabr = "Commun ACM", 19962 keywords = "automata theory --- Grammars; computational complexity; computations; computer metatheory --- Programming Theory; computer programming; context free grammar; context-free grammars; precedence relations; sparse relations", 19963 treatment = "T Theoretical or Mathematical", 19964} 19965 19966@Article{Nolan:1977:ECU, 19967 author = "Richard L. Nolan", 19968 title = "Effects of Chargeout on User\slash Manager Attitudes", 19969 journal = j-CACM, 19970 volume = "20", 19971 number = "3", 19972 pages = "177--185", 19973 month = mar, 19974 year = "1977", 19975 CODEN = "CACMA2", 19976 ISSN = "0001-0782", 19977 bibdate = "Tue Mar 25 13:26:09 MST 1997", 19978 bibsource = "Compendex database", 19979 abstract = "The relationship of internal pricing systems for computer services (chargeout systems) and user management attitudes about their computer-based information systems is investigated. Development and maintenance of computer-based systems is asserted to be a category of organizational change. A ``felt need'' for the change on the part of the user\slash manager is prerequisite to any change taking place. The research methods of behavioral science are applied to investigate the user\slash manager environment and the effects of chargeout.", 19980 acknowledgement = ack-nhfb, 19981 classcodes = "C0310 (EDP management)", 19982 classification = "723", 19983 corpsource = "Harvard Univ., Boston, MA, USA", 19984 journalabr = "Commun ACM", 19985 keywords = "attitudes; chargeout; computer facilities; computer services; data processing, business; DP management; internal pricing systems; user/manager attitudes", 19986 treatment = "E Economic", 19987} 19988 19989@Article{Borovits:1977:CUM, 19990 author = "Israel Borovits and Philip Ein-Dor", 19991 title = "Cost\slash utilization: {A} measure of system performance", 19992 journal = j-CACM, 19993 volume = "20", 19994 number = "3", 19995 pages = "185--191", 19996 month = mar, 19997 year = "1977", 19998 CODEN = "CACMA2", 19999 ISSN = "0001-0782", 20000 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20001 bibsource = "Compendex database", 20002 abstract = "A method is presented for evaluating computer system performance in terms of a cost\slash utilization factor and a measure of imbalance. These coefficients indicate the extent to which the total system cost is effectively utilized. The method includes a technique for the visual representation of system performance.", 20003 acknowledgement = ack-nhfb, 20004 classcodes = "C0310 (EDP management); C6150G (Diagnostic, testing, debugging and evaluating systems)", 20005 classification = "723; 911", 20006 corpsource = "Tel-Aviv Univ., Tel-Aviv, Israel", 20007 journalabr = "Commun ACM", 20008 keywords = "computer systems, digital; cost accounting", 20009 keywords = "computer; computer selection and evaluation; cost; cost/utilization factor; evaluating; measure; measure of imbalance; system performance; total system", 20010 treatment = "E Economic; P Practical", 20011} 20012 20013@Article{Bays:1977:CNF, 20014 author = "C. Bays", 20015 title = "A comparison of next-fit, first-fit, and best-fit", 20016 journal = j-CACM, 20017 volume = "20", 20018 number = "3", 20019 pages = "191--192", 20020 month = mar, 20021 year = "1977", 20022 CODEN = "CACMA2", 20023 ISSN = "0001-0782", 20024 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20025 acknowledgement = ack-nhfb, 20026 classcodes = "C6120 (File organisation)", 20027 corpsource = "Univ. of South Carolina, Columbia, SC, USA", 20028 keywords = "best; comparison; first fit; fit; next fit; storage allocation", 20029 treatment = "P Practical", 20030} 20031 20032@Article{Bertsch:1977:SRP, 20033 author = "Eberhard Bertsch", 20034 title = "The storage requirement in precedence parsing", 20035 journal = j-CACM, 20036 volume = "20", 20037 number = "3", 20038 pages = "192--196 (or 192--194??)", 20039 month = mar, 20040 year = "1977", 20041 CODEN = "CACMA2", 20042 ISSN = "0001-0782", 20043 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20044 bibsource = "Compendex database", 20045 abstract = "Precedence tables and linear precedence functions have been used and extensively studied as aids for syntax-directed compiling. If a precedence table exists but cannot be reshaped into a pair of precedence functions, several techniques for eliminating blank entries may be used. In that case, all nonblank entries have to be kept, however. Thus, there is a considerable gap between the storage requirements of precedence functions and precedence tables. The purpose of this paper is to show that the gap between precedence functions and precedence tables can be closed in a natural way.", 20046 acknowledgement = ack-nhfb, 20047 classcodes = "C6150C (Compilers, interpreters and other processors)", 20048 classification = "723", 20049 corpsource = "Univ des Saarlandes, Saarbrucken, West Germany", 20050 journalabr = "Commun ACM", 20051 keywords = "computer metatheory --- Programming Theory; computer operating systems; computer programming --- Subroutines; precedence parsing; program compilers; storage requirement; value table", 20052 treatment = "A Application; T Theoretical or Mathematical", 20053} 20054 20055@Article{Morris:1977:SI, 20056 author = "James H. {Morris, Jr.} and Ben Wegbreit", 20057 title = "Subgoal Induction", 20058 journal = j-CACM, 20059 volume = "20", 20060 number = "4", 20061 pages = "209--222", 20062 month = apr, 20063 year = "1977", 20064 CODEN = "CACMA2", 20065 ISSN = "0001-0782", 20066 MRclass = "68A05", 20067 MRnumber = "56 4222", 20068 mrreviewer = "Andrea Maggiolo-Schettini", 20069 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20070 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib", 20071 abstract = "A proof method, subgoal induction, is presented as an alternative or supplement to the commonly used inductive assertion method. Its major virtue is that it can often be used to prove a loop's correctness directly from its input-output specification without the use of an invariant. The relation between subgoal induction and other commonly used induction rules is explored and, in particular, it is shown that subgoal induction can be viewed as a specialized form of computation induction.", 20072 acknowledgement = ack-nhfb, 20073 classcodes = "C4240 (Programming and algorithm theory)", 20074 classification = "723", 20075 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 20076 journalabr = "Commun ACM", 20077 keywords = "computer metatheory --- Programming Theory; computer programming; computer programming languages --- Program Debugging; functional verification correctness; program proving; programming theory; subgoal induction", 20078 treatment = "T Theoretical or Mathematical", 20079} 20080 20081@Article{Tanimoto:1977:EPS, 20082 author = "Steven L. Tanimoto and Theodosios Pavlidis", 20083 title = "Editing of Picture Segmentations Using Local Analysis of Graphs", 20084 journal = j-CACM, 20085 volume = "20", 20086 number = "4", 20087 pages = "223--229", 20088 month = apr, 20089 year = "1977", 20090 CODEN = "CACMA2", 20091 ISSN = "0001-0782", 20092 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20093 bibsource = "Compendex database", 20094 abstract = "A major problem in picture processing is the elimination of the large number of spurious regions that result from an initial segmentation by region growing techniques. This paper describes a nonsemantic editing scheme which performs eliminations on the basis of local properties of the region adjacency graph. The scheme is based on definitions of graph properties which are satisfied when a spurious region is present; then editing is equivalent to fast graph operations. A number of examples are shown.", 20095 acknowledgement = ack-nhfb, 20096 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 20097 classification = "723; 921", 20098 corpsource = "Univ. of Connecticut, Storrs, CT, USA", 20099 journalabr = "Commun ACM", 20100 keywords = "editing; graphs; image processing; local analysis; mathematical techniques --- Graph Theory; pattern recognition systems; picture processing; picture segmentations", 20101 treatment = "T Theoretical or Mathematical", 20102} 20103 20104@Article{Findler:1977:SMC, 20105 author = "Nicholas V. Findler", 20106 title = "Studies in Machine Cognition Using the Game of Poker", 20107 journal = j-CACM, 20108 volume = "20", 20109 number = "4", 20110 pages = "230--245", 20111 month = apr, 20112 year = "1977", 20113 CODEN = "CACMA2", 20114 ISSN = "0001-0782", 20115 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20116 bibsource = "Compendex database", 20117 abstract = "A progress report is presented of on-going research efforts concerning human decision-making under uncertainty and risk and human problem-solving and learning processes on the one hand, and machine learning, large scale programming system, and novel programming techniques on the other. There has also been interest in how humans make deductive and inductive inferences and form and optimize heuristic rules, and how machines can reach similar results. Although the vehicle of these investigations has been the game of poker, a conceptual framework has been provided that should have a fairly wide range of applicability.", 20118 acknowledgement = ack-nhfb, 20119 classcodes = "C1230 (Artificial intelligence)", 20120 classification = "461; 723; 912; 922", 20121 corpsource = "State Univ. of New York, Buffalo, NY, USA", 20122 journalabr = "Commun ACM", 20123 keywords = "artificial intelligence; data processing --- Psychology Applications; decision theory and analysis; human decision making; human problem solving; large scale programming systems; learning; machine cognition; machine learning; poker; probability; processes; risk; systems science and cybernetics; uncertainty", 20124 treatment = "T Theoretical or Mathematical", 20125} 20126 20127@Article{Maruyama:1977:ADA, 20128 author = "K. Maruyama and S. E. Smith", 20129 title = "Analysis of Design Alternatives for Virtual Memory Indexes", 20130 journal = j-CACM, 20131 volume = "20", 20132 number = "4", 20133 pages = "245--254", 20134 month = apr, 20135 year = "1977", 20136 CODEN = "CACMA2", 20137 ISSN = "0001-0782", 20138 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20139 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 20140 abstract = "A class of index structures modeled after the structure of VSAM --- similar to B-trees but biased toward sequential processing --- is described. Design alternatives within this class of index structures are analyzed. These alternatives include a choice of search strategy, whether or not pages in the index are structured, and whether or not keys are compressed. The average cost of retrieving entries from these indexes is expressed as a weighted sum of the cost of a basic key comparison and the cost of crossing a page boundary in the index structure. Formulas for the retrieval costs for possible combinations of design alternatives are given.", 20141 acknowledgement = ack-nhfb, 20142 classcodes = "C6120 (File organisation)", 20143 classification = "723", 20144 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 20145 journalabr = "Commun ACM", 20146 keywords = "compressed; costs; data processing --- Data Handling; data storage, digital; design alternatives; index structures; pages; retrieval; search strategy; structured; virtual memory; virtual storage", 20147 treatment = "P Practical", 20148} 20149 20150@Article{Lucas:1977:SHS, 20151 author = "Henry C. {Lucas, Jr.} and Jimmy A. Sutton", 20152 title = "Stage Hypothesis and the {S}-Curve: Some Contradictory Evidence", 20153 journal = j-CACM, 20154 volume = "20", 20155 number = "4", 20156 pages = "254--259", 20157 month = apr, 20158 year = "1977", 20159 CODEN = "CACMA2", 20160 ISSN = "0001-0782", 20161 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20162 bibsource = "Compendex database", 20163 abstract = "The s-shaped budget curve of R. Nolan's stage model of computer development in an organization (Comm ACM v 16 n 7 Jul 1973 p 399) is tested. Research on the data processing budgets of California counties fails to support the s-shaped curve or the use of budgets as a basis for a stage model. However, the results do not invalidate the concept of a stage model. The analysis suggests an alternative model of budget growth and a separation between models of budgeting growth and growth stages in the development of the computer resource.", 20164 acknowledgement = ack-nhfb, 20165 classcodes = "C0310 (EDP management)", 20166 classification = "723; 911; 912", 20167 corpsource = "New York Univ., New York, NY, USA", 20168 journalabr = "Commun ACM", 20169 keywords = "budget curve; computer development; data; data processing; DP management; management --- Applications; processing budgets; stage hypothesis", 20170 treatment = "T Theoretical or Mathematical", 20171} 20172 20173@Article{Yao:1977:ABA, 20174 author = "S. B. Yao", 20175 title = "Approximating block accesses in database organizations", 20176 journal = j-CACM, 20177 volume = "20", 20178 number = "4", 20179 pages = "260--261", 20180 month = apr, 20181 year = "1977", 20182 CODEN = "CACMA2", 20183 ISSN = "0001-0782", 20184 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20185 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 20186 acknowledgement = ack-nhfb, 20187 classcodes = "C6120 (File organisation)", 20188 corpsource = "Purdue Univ., West Lafayette, IN, USA", 20189 keywords = "approximating; block accesses; database organizations; file organisation; inverted file; selectivity estimation I/O cost query optimization CACM", 20190 treatment = "A Application; T Theoretical or Mathematical", 20191 xxtitle = "Approximating Block Accesses in Database Organization", 20192} 20193 20194@Article{Hollander:1977:RUI, 20195 author = "C. R. Hollander", 20196 title = "Remark on uniform insertion on structured data structures", 20197 journal = j-CACM, 20198 volume = "20", 20199 number = "4", 20200 pages = "261--262", 20201 month = apr, 20202 year = "1977", 20203 CODEN = "CACMA2", 20204 ISSN = "0001-0782", 20205 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20206 acknowledgement = ack-nhfb, 20207 classcodes = "C6120 (File organisation)", 20208 corpsource = "IBM Sci. Center, Palo Alto, CA, USA", 20209 keywords = "data structures; structured data structures; uniform insertion", 20210 treatment = "T Theoretical or Mathematical", 20211} 20212 20213@Article{Bandyopadhyay:1977:CWI, 20214 author = "S. K. Bandyopadhyay", 20215 title = "Comment on weighted increment linear search for scatter tables", 20216 journal = j-CACM, 20217 volume = "20", 20218 number = "4", 20219 pages = "262--263", 20220 month = apr, 20221 year = "1977", 20222 CODEN = "CACMA2", 20223 ISSN = "0001-0782", 20224 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20225 acknowledgement = ack-nhfb, 20226 classcodes = "C6120 (File organisation)", 20227 corpsource = "Aeronautical Dev. Establ., Bangalore, India", 20228 keywords = "address; file organisation; hash; primary clustering; scatter tables; weighted increment linear search", 20229 treatment = "P Practical", 20230} 20231 20232@Article{Thompson:1977:SMC, 20233 author = "C. D. Thompson and H. T. Kung", 20234 title = "Sorting on a Mesh-Connected Parallel Computer", 20235 journal = j-CACM, 20236 volume = "20", 20237 number = "4", 20238 pages = "263--271", 20239 month = apr, 20240 year = "1977", 20241 CODEN = "CACMA2", 20242 ISSN = "0001-0782", 20243 MRclass = "68A10 (68A20)", 20244 MRnumber = "55 11693", 20245 mrreviewer = "Jo Ann Howell", 20246 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20247 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.comm.bib", 20248 abstract = "Two algorithms are presented for sorting n**2 elements on an n multiplied by n mesh-connected processor array that require O (n) routing and comparison steps. The best previous algorithm takes time O(n log n). The algorithms are shown to be optimal in time within small constant factors. Extensions to higher-dimensional arrays are also given.", 20249 acknowledgement = ack-nhfb, 20250 classcodes = "C6130 (Data handling techniques)", 20251 classification = "722; 723", 20252 corpsource = "Carnegie-Mellon Univ., Pittsburgh, PA, USA", 20253 journalabr = "Commun ACM", 20254 keywords = "computer programming --- Subroutines; computer systems programming --- Sorting; computer systems, digital", 20255 keywords = "mesh connected; parallel computer; parallel processing; sorting", 20256 treatment = "P Practical", 20257} 20258 20259@Article{Robinson:1977:PTH, 20260 author = "Lawrence Robinson and Karl N. Levitt", 20261 title = "Proof Techniques for Hierarchically Structured Programs", 20262 journal = j-CACM, 20263 volume = "20", 20264 number = "4", 20265 pages = "271--283", 20266 month = apr, 20267 year = "1977", 20268 CODEN = "CACMA2", 20269 ISSN = "0001-0782", 20270 MRclass = "68A05", 20271 MRnumber = "57 14584", 20272 mrreviewer = "Franco Sirovich", 20273 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20274 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 20275 abstract = "A method for describing and structuring programs that simplifies proofs of their correctness is presented. The method formally represents a program in terms of levels of abstraction, each level of which can be described by a self-contained nonprocedural specification. The proofs, like the programs, are structured by levels. Although only manual proofs are described, the method is also applicable to semiautomatic and automatic proofs. Preliminary results indicate that the method can be applied to large programs, such as operating systems.", 20276 acknowledgement = ack-nhfb, 20277 classcodes = "C6110 (Systems analysis and programming)", 20278 classification = "461; 723; 912", 20279 corpsource = "Stanford Res. Inst., Menlo Park, CA, USA", 20280 journalabr = "Commun ACM", 20281 keywords = "computer metatheory --- Programming Theory; computer programming; correctness; hierarchically structured programs; program testing; proofs; structured programming; systems science and cybernetics --- Hierarchical Systems", 20282 treatment = "P Practical", 20283} 20284 20285@Article{Holt:1977:SKS, 20286 author = "R. C. Holt and D. B. Wortman and D. T. Barnard and J. R. Cordy", 20287 title = "{SP/k}: {A} System for Teaching Computer Programming", 20288 journal = j-CACM, 20289 volume = "20", 20290 number = "5", 20291 pages = "301--309", 20292 month = may, 20293 year = "1977", 20294 CODEN = "CACMA2", 20295 ISSN = "0001-0782", 20296 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20297 bibsource = "Compendex database", 20298 abstract = "SP/k, a compatible subset of the PL/I language, is a sequence of language subsets called SP/1, SP/2,\ldots{} SP/8. Each subset introduces new programming language constructs while retaining all the constructs of preceding subsets. The features of the SP/k language were chosen to encourage structured problem solving by computers, to make the language easy to learn and use, to eliminate confusing and redundant constructs, and to make the language easy to compile. Language features, processor design, and system experience are discussed.", 20299 acknowledgement = ack-nhfb, 20300 classcodes = "C0220 (Computing education and training); C6110 (Systems analysis and programming); C6140D (High level languages)", 20301 classification = "723; 901", 20302 corpsource = "Univ. of Toronto, Toronto, Ont., Canada", 20303 journalabr = "Commun ACM", 20304 keywords = "compatible subset; computer programming; computer science education; PL/1; PL/I language; programming; SP/k; teaching", 20305 keywords = "computer programming languages; education", 20306 treatment = "P Practical", 20307} 20308 20309@Article{Fishman:1977:ASA, 20310 author = "George S. Fishman", 20311 title = "Achieving Specific Accuracy in Simulation Output Analysis", 20312 journal = j-CACM, 20313 volume = "20", 20314 number = "5", 20315 pages = "310--315", 20316 month = may, 20317 year = "1977", 20318 CODEN = "CACMA2", 20319 ISSN = "0001-0782", 20320 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20321 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib", 20322 abstract = "This paper extends the use of the regenerative property of queueing systems in the analysis of simulation output. In particular, it describes a sequential estimation method which when used with the regenerative property allows results to be obtained with specified statistical accuracy. This method includes a test to check the normality assumption on which the sequential procedure relies. The paper illustrates the method using the empty and idle state as the regenerative state. A second example then describes how using the most frequently entered state as the regenerative state reduces the chance of making a costly error in a preliminary simulation run. The paper also described how a variance reduction method due to Page [9] can be used to obtain a specified accuracy with considerably fewer job completions than are required when no variance reduction technique is applied.", 20323 acknowledgement = ack-nhfb, 20324 classcodes = "C1220 (Simulation, modelling and identification)", 20325 classification = "723; 912; 922", 20326 corpsource = "Univ. of North Carolina, Chapel Hill, NC, USA", 20327 country = "USA", 20328 descriptors = "Simulation; time series analysis;", 20329 enum = "952", 20330 journalabr = "Commun ACM", 20331 keywords = "accuracy; computer simulation; confidence in terval; mathematical statistics; operations research --- Computer Applications; probability --- Queueing Theory; queueing systems; queueing theory; ratio estimator; regenerative property; sequential estimation method; sequential estimator; simulation; simulation output analysis; stopping rule; variance reduction", 20332 language = "English", 20333 references = "0", 20334 treatment = "P Practical", 20335} 20336 20337@Article{Morgan:1977:OPD, 20338 author = "Howard L. Morgan and K. Dan Levin", 20339 title = "Optimal Program and Data Locations in Computer Networks", 20340 journal = j-CACM, 20341 volume = "20", 20342 number = "5", 20343 pages = "315--322", 20344 month = may, 20345 year = "1977", 20346 CODEN = "CACMA2", 20347 ISSN = "0001-0782", 20348 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20349 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/storage.bib", 20350 abstract = "An optimization procedure for the allocation of program and data files in a computer network is presented. This algorithm takes into account the dependencies between files and programs such as occur in real heterogeneous computer networks. A search procedure for the file location problem is described, along with an example and a possible application of the model.", 20351 acknowledgement = ack-nhfb, 20352 classcodes = "C5620 (Computer networks and techniques); C6120 (File organisation)", 20353 classification = "723", 20354 corpsource = "Univ. of Pennsylvania, Philadelphia, PA, USA", 20355 journalabr = "Commun ACM", 20356 keywords = "computer networks; computer programming --- Subroutines; computers --- Data Communication Systems; data base systems --- Optimization; data locations; data processing --- Data Handling; mathematical models; optimization procedure; program; storage allocation", 20357 treatment = "A Application; T Theoretical or Mathematical", 20358} 20359 20360@Article{Baer:1977:CTB, 20361 author = "J.-L. Baer and B. Schwab", 20362 title = "A Comparison of Tree-Balancing Algorithms", 20363 journal = j-CACM, 20364 volume = "20", 20365 number = "5", 20366 pages = "322--330", 20367 month = may, 20368 year = "1977", 20369 CODEN = "CACMA2", 20370 ISSN = "0001-0782", 20371 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20372 bibsource = "Compendex database", 20373 abstract = "Several algorithms-height-balance (i.e. AVL and extensions), weight-balance (i.e. BB and WB), and total restructuring-for building balanced binary search trees are compared. The criteria for comparison encompass theoretical aspects (e.g. path lengths) and implementation independent and machine/algorithm-dependent measures (e.g. run time). A detailed analysis of code is also presented at a level believed to be language-and compiler-independent. The quality of the resulting trees and the overhead spent on building them are analyzed, and some guidelines are given for an efficient use of the methods. If insertion and subsequent queries are the only operations of in terest, then ``pure'' AVL trees present the overall best qualities.", 20374 acknowledgement = ack-nhfb, 20375 classcodes = "C4240 (Programming and algorithm theory)", 20376 classification = "723; 901; 921", 20377 corpsource = "Univ. of Washington, Seattle, WA, USA", 20378 journalabr = "Commun ACM", 20379 keywords = "algorithm theory; balance; balanced binary search; comparison; height balance; total restructuring; tree balancing algorithms; trees; weight", 20380 keywords = "analysis of algorithms; AVL trees; binary search trees; computer programming --- Subroutines; data processing; information retrieval systems; information storage and retrieval; mathematical techniques --- Trees; path length; weight-balanced trees", 20381 treatment = "T Theoretical or Mathematical", 20382} 20383 20384@Article{Stillman:1977:CHS, 20385 author = "Neil J. Stillman and P. Bruce Berra", 20386 title = "A Comparison of Hardware and Software Associative Memories in the Context of Computer Graphics", 20387 journal = j-CACM, 20388 volume = "20", 20389 number = "5", 20390 pages = "331--339", 20391 month = may, 20392 year = "1977", 20393 CODEN = "CACMA2", 20394 ISSN = "0001-0782", 20395 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20396 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/77.bib", 20397 abstract = "The Associative Processing of Line Drawings (APLD) System utilizes a hardware associative memory and creates, modifies, deletes, stores, and retrieves two-dimensional line drawings consisting of points, lines, rectangles, and triangles. The APLD functions were duplicated on the TX-2 computer at M. I. T. 's Lincoln Laboratory under the LEAP Language and Data Structure. A comparison of the hardware approach with the software simulation illustrates the advantages of the hardware associative memory.", 20398 acknowledgement = ack-nhfb, 20399 classcodes = "C6120 (File organisation); C6130B (Graphics techniques)", 20400 classification = "722; 723", 20401 corpsource = "Defense Communications Agency, Washington, DC, USA", 20402 journalabr = "Commun ACM", 20403 keywords = "associative and memory; associative memories; associative processing of line drawings; comparison; computer graphics; computer systems, digital --- Parallel Processing; content-addressable storage; data storage, digital --- Associative; hardware; image processing; software", 20404 treatment = "P Practical", 20405} 20406 20407@Article{Shapiro:1977:CRP, 20408 author = "Marvin Shapiro", 20409 title = "Choice of Reference Points in Best-Match File Searching", 20410 journal = j-CACM, 20411 volume = "20", 20412 number = "5", 20413 pages = "339--343", 20414 month = may, 20415 year = "1977", 20416 CODEN = "CACMA2", 20417 ISSN = "0001-0782", 20418 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20419 bibsource = "Compendex database", 20420 abstract = "Improvements to the exhaustive search method of best-match file searching have previously been achieved by doing a preprocessing step involving the calculation of distances from a reference point (Comm ACM, V16 n 4 April 1973 p 230). This paper discusses the proper choice of reference points and extends the previous algorithm to use more than one reference point. It is shown that reference points should be located outside of data clusters.", 20421 acknowledgement = ack-nhfb, 20422 classcodes = "C6120 (File organisation)", 20423 classification = "723; 901", 20424 corpsource = "Nat. Inst. of Health, Bethesda, MD, USA", 20425 journalabr = "Commun ACM", 20426 keywords = "best match; choice; computer programming --- Subroutines; data processing; file organisation; file searching; information retrieval systems; reference points", 20427 treatment = "P Practical", 20428} 20429 20430@Article{Hanani:1977:OEB, 20431 author = "Michael Z. Hanani", 20432 title = "An Optimal Evaluation of {Boolean} Expressions in an Online Query System", 20433 journal = j-CACM, 20434 volume = "20", 20435 number = "5", 20436 pages = "344--347", 20437 month = may, 20438 year = "1977", 20439 CODEN = "CACMA2", 20440 ISSN = "0001-0782", 20441 MRclass = "68A50", 20442 MRnumber = "55 9627", 20443 mrreviewer = "K. H. V. Booth", 20444 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20445 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 20446 abstract = "In the system discussed, in a response to a query, the entire file containing hundreds of thousands of records has to be searched, and the Boolean expression is evaluated for each record. The method presented improves the performance of such a system by speeding up the process of computing the truth value of a Boolean expression for an individual record. This is done by evaluating the expression based on the values of a subset of its components rather than the entire expression.", 20447 acknowledgement = ack-nhfb, 20448 classcodes = "C4210 (Formal logic); C6120 (File organisation)", 20449 classification = "722; 723; 901", 20450 corpsource = "Ben Gurion Univ., Negev, Israel", 20451 journalabr = "Commun ACM", 20452 keywords = "Boolean algebra; Boolean expressions; computer programming --- Subroutines; computer systems, digital --- On Line Systems; data base systems; data processing --- Data Handling; file organisation; file searching; information retrieval systems; online query system; optimal evaluation; order sort clauses by cost and selectivity CACM", 20453 treatment = "A Application; T Theoretical or Mathematical", 20454} 20455 20456@Article{Milman:1977:AOD, 20457 author = "Y. Milman", 20458 title = "An Approach to Optimal Design of Storage Parameters in Databases", 20459 journal = j-CACM, 20460 volume = "20", 20461 number = "5", 20462 pages = "347--350", 20463 month = may, 20464 year = "1977", 20465 CODEN = "CACMA2", 20466 ISSN = "0001-0782", 20467 MRclass = "68A50", 20468 MRnumber = "55 7007", 20469 mrreviewer = "Clement T. Yu", 20470 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20471 bibsource = "Compendex database", 20472 abstract = "Storage and response-time requirements are contradictory in nature, and in any real-world, the problem, one has to attain a rational equilibrium between them. The actual location of this equilibrium depends on the conditions of the specific problem. The purpose of this paper is to present a simple approach that can be employed to locate such an equilibrium, and to demonstrate its use in an actual application.", 20473 acknowledgement = ack-nhfb, 20474 classcodes = "C6120 (File organisation)", 20475 classification = "723", 20476 corpsource = "Contahal Ltd., Tel-Aviv, Israel", 20477 journalabr = "Commun ACM", 20478 keywords = "data base systems; data storage, digital; database management systems; databases; optimal design; storage parameters", 20479 treatment = "P Practical", 20480} 20481 20482@Article{Hunt:1977:FAC, 20483 author = "James W. Hunt and Thomas G. Szymanski", 20484 title = "A Fast Algorithm for Computing Longest Common Subsequences", 20485 journal = j-CACM, 20486 volume = "20", 20487 number = "5", 20488 pages = "350--353", 20489 month = may, 20490 year = "1977", 20491 CODEN = "CACMA2", 20492 ISSN = "0001-0782", 20493 MRclass = "68A10 (68A20)", 20494 MRnumber = "55 9596", 20495 mrreviewer = "C. L. Liu", 20496 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20497 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib", 20498 abstract = "Previously published algorithms for handling the longest common subsequence of two sequence of length n have had a best-case running time of O(n//2). An algorithm for this problem is presented which has a running time O((r plus n) log n), where r is the total number of ordered pairs of positions at which the two sequences match. Thus in the worst case the algorithm has a running time of O(n**2 log n).", 20499 acknowledgement = ack-nhfb, 20500 classcodes = "C4240 (Programming and algorithm theory)", 20501 classification = "723", 20502 comment = "``Previously published algorithms for finding the longest common subsequence of two sequences of length $n$ have had a best--case running time of $O(n^2)$. An algorithm for this problem is presented which has a running time of $O((r + n) \log n)$, where $r$ is the total number of ordered pairs of positions at which the two sequences match. Thus in the worst case the algorithm has a running time of $O(n^2 \log n)$. However, for those applications where most positions of one sequence match relatively few positions in the other sequence, a running time of $O(n \log n$) can be expected.''", 20503 corpsource = "Stanford Univ., Stanford, CA, USA", 20504 journalabr = "Commun ACM", 20505 keywords = "algorithm theory; computer programming --- Subroutines; data processing; fast algorithm; file searching; longest common subsequences; two sequences", 20506 treatment = "T Theoretical or Mathematical", 20507} 20508 20509@Article{Taulbee:1977:PEP, 20510 author = "Orrin E. Taulbee and S. D. Conte", 20511 title = "Production and Employment of {Ph.D.}'s in Computer Science --- 1976", 20512 journal = j-CACM, 20513 volume = "20", 20514 number = "6", 20515 pages = "370--372", 20516 month = jun, 20517 year = "1977", 20518 CODEN = "CACMA2", 20519 ISSN = "0001-0782", 20520 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20521 bibsource = "Compendex database", 20522 abstract = "Statistics are presented on the production and employment of Ph. D's in computer science for the calendar year 1975-76. Data include profiles of graduate students and of faculty at 60 Ph. D. --- producing departments as well as breakdown of degrees granted by specialty areas. Significant trends are noted and comparisons with comparable data gathered for the 1974-75 calendar year are made.", 20523 acknowledgement = ack-nhfb, 20524 classcodes = "C0220 (Computing education and training)", 20525 classification = "723; 901; 912", 20526 corpsource = "Univ. of Pittsburgh, Pittsburgh, PA, USA", 20527 journalabr = "Commun ACM", 20528 keywords = "computer science; computer science education; data processing; education; employment; PhD; production; statistics", 20529 treatment = "G General Review", 20530} 20531 20532@Article{Shneiderman:1977:EIU, 20533 author = "Ben Shneiderman and Richard Mayer and Don McKay and Peter Heller", 20534 title = "Experimental Investigations of the Utility of Detailed Flowcharts in Programming", 20535 journal = j-CACM, 20536 volume = "20", 20537 number = "6", 20538 pages = "373--381", 20539 month = jun, 20540 year = "1977", 20541 CODEN = "CACMA2", 20542 ISSN = "0001-0782", 20543 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20544 bibsource = "Compendex database", 20545 abstract = "This paper describes previous research on flowcharts and a series of controlled experiments to test the utility of detailed flowcharts as an aid to program composition, comprehension, debugging, and modification. No statistically significant difference between flowchart and nonflowchart groups has been shown, thereby calling into question the utility of detailed flowcharting. A program of further research is suggested.", 20546 acknowledgement = ack-nhfb, 20547 classcodes = "C6110 (Systems analysis and programming)", 20548 classification = "723", 20549 corpsource = "Indiana Univ., Bloomington, IN, USA", 20550 journalabr = "Commun ACM", 20551 keywords = "aid; comprehension; computer programming; computer programming languages; controlled experiments; debugging; detailed flowcharts; flowcharting; modification; program composition; utility", 20552 treatment = "P Practical", 20553} 20554 20555@Article{Ledgard:1977:TVD, 20556 author = "H. F. Ledgard and R. W. Taylor", 20557 title = "Two Views of Data Abstraction", 20558 journal = j-CACM, 20559 volume = "20", 20560 number = "6", 20561 pages = "382--384", 20562 month = jun, 20563 year = "1977", 20564 CODEN = "CACMA2", 20565 ISSN = "0001-0782", 20566 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20567 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 20568 acknowledgement = ack-nhfb, 20569 classcodes = "C6120 (File organisation)", 20570 corpsource = "Univ. of Massachusetts, Amherst, MA, USA", 20571 keywords = "data abstraction; data structures; database; language; types data abstraction", 20572 treatment = "G General Review", 20573} 20574 20575@Article{Zloof:1977:SBA, 20576 author = "Mosh{\'e} M. Zloof and S. Peter {de Jong}", 20577 title = "The System {for Business Automation} ({SBA}): Programming Language", 20578 journal = j-CACM, 20579 volume = "20", 20580 number = "6", 20581 pages = "385--396", 20582 month = jun, 20583 year = "1977", 20584 CODEN = "CACMA2", 20585 ISSN = "0001-0782", 20586 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20587 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 20588 abstract = "The system for business automation (SBA) is a system within which application experts --- nonprogrammers --- can describe and execute their applications on a computer. The user of SBA views the application as manipulation of information in two-dimensional pictures of tables, business forms, and reports on a display terminal. The application can be automated gradually by giving ``examples'' to the system of how the information would be manipulated manually. The Query-by-Example database language is a subset of the SBA programming language.", 20589 acknowledgement = ack-nhfb, 20590 classcodes = "C6140D (High level languages); C7100 (Business and administration)", 20591 classification = "723; 901", 20592 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 20593 journalabr = "Commun ACM", 20594 keywords = "administrative data processing; automatic programming; business automation; by Example; computer programming languages; data processing --- Data Structures; data processing, business; database language; display terminal; information retrieval systems; nonprogrammers; problem oriented languages; programming language; Query; SBA", 20595 treatment = "E Economic; P Practical", 20596} 20597 20598@Article{Guttag:1977:ADT, 20599 author = "John V. Guttag", 20600 title = "Abstract Data Types and the Development of Data Structures", 20601 journal = j-CACM, 20602 volume = "20", 20603 number = "6", 20604 pages = "396--404", 20605 month = jun, 20606 year = "1977", 20607 CODEN = "CACMA2", 20608 ISSN = "0001-0782", 20609 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20610 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib and ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib", 20611 abstract = "Abstract data types can play a significant role in the development of software that is reliable, efficient, and flexible. This paper presents and discusses the application of an algebraic technique for the specification of abstract data types. Among the examples presented is a top-down development of a symbol table for a block structured language; a discussion of the proof of its correctness is given. A brief discussion of the problems involved in constructing algebraic specifications that are both consistent and complete is also provided.", 20612 acknowledgement = ack-nhfb, 20613 classcodes = "C6120 (File organisation)", 20614 classification = "723; 921", 20615 corpsource = "Univ. of Southern California, Los Angeles, CA, USA", 20616 journalabr = "Commun ACM", 20617 keywords = "abstract data types; algebraic technique; computer metatheory; computer programming --- Reliability; computer programming languages; data processing --- Data Structures; data structures; data types; development; functional types olit data abstraction; mathematical techniques --- Algebra; specification", 20618 treatment = "P Practical", 20619} 20620 20621@Article{Smith:1977:DAA, 20622 author = "John Miles Smith and Diane C. P. Smith", 20623 title = "Database Abstractions: Aggregation", 20624 journal = j-CACM, 20625 volume = "20", 20626 number = "6", 20627 pages = "405--413", 20628 month = jun, 20629 year = "1977", 20630 CODEN = "CACMA2", 20631 ISSN = "0001-0782", 20632 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20633 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 20634 abstract = "A new data type, called aggregate, is developed which, under certain criteria of ``well-definedness,'' specifies aggregation abstractions. A top-down methodology for database design is described which separates decisions concerning aggregate structure from decisions concerning key identification. It is suggested that aggregate types, and other types which support real-world abstractions without introducing implementation detail, should be incorporated into programming languages.", 20635 acknowledgement = ack-nhfb, 20636 classcodes = "C6120 (File organisation)", 20637 classification = "723", 20638 corpsource = "Univ. of Utah, Salt Lake City, UT, USA", 20639 journalabr = "Commun ACM", 20640 keywords = "computer programming languages; data aggregates; data base systems --- Design; data processing; data types", 20641 keywords = "abstractions; aggregation; data structures; databases", 20642 treatment = "T Theoretical or Mathematical", 20643} 20644 20645@Article{Gries:1977:SID, 20646 author = "David Gries and Narain Gehani", 20647 title = "Some Ideas on Data Types in High-Level Languages", 20648 journal = j-CACM, 20649 volume = "20", 20650 number = "6", 20651 pages = "414--420", 20652 month = jun, 20653 year = "1977", 20654 CODEN = "CACMA2", 20655 ISSN = "0001-0782", 20656 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20657 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 20658 abstract = "A number of issues are explored concerning the notion that a data type is a set of values together with a set of primitive operations on those values. Among these are the need for a notation for iterating over the elements of any finite set (instead of the more narrow for i: equals 1 to n notation), the use of the domain of an array as a data type, the need for a simple notation for allowing types of parameters to be themselves parameters (but in a restrictive fashion), and resulting problems with conversion of values from one type to another.", 20659 acknowledgement = ack-nhfb, 20660 classcodes = "C4240 (Programming and algorithm theory); C6120 (File organisation)", 20661 classification = "723", 20662 corpsource = "Cornell Univ., Ithaca, NY, USA", 20663 journalabr = "Commun ACM", 20664 keywords = "computer meta theory --- Algorithmic Languages; computer programming languages; data processing --- Data Structures; data structures; data types; high level languages; primitive operations; programming theory; types olit iteration", 20665 treatment = "T Theoretical or Mathematical", 20666} 20667 20668@Article{Peterson:1977:BS, 20669 author = "James L. Peterson and Theodore A. Norman", 20670 title = "Buddy Systems", 20671 journal = j-CACM, 20672 volume = "20", 20673 number = "6", 20674 pages = "421--431", 20675 month = jun, 20676 year = "1977", 20677 CODEN = "CACMA2", 20678 ISSN = "0001-0782", 20679 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20680 bibsource = "Compendex database", 20681 abstract = "Two algorithms are presented for implementing any of a class of buddy systems for dynamic storage allocation. Each buddy system corresponds to a set of recurrence relations which relate the block sizes provided to each other. Analyses of the internal fragmentation of the binary buddy system, the Fibonacci buddy system, and the weighted buddy system are given. Comparative simulation results are also presented for internal, external, and total fragmentation.", 20682 acknowledgement = ack-nhfb, 20683 classcodes = "C6120 (File organisation)", 20684 classification = "723", 20685 corpsource = "Univ. of Texas, Austin, TX, USA", 20686 journalabr = "Commun ACM", 20687 keywords = "algorithms; buddy systems; computer operating systems; computer programming --- Subroutines; computer programs; data storage, digital; dynamic storage allocation; recurrence relations; storage allocation", 20688 treatment = "T Theoretical or Mathematical", 20689} 20690 20691@Article{Robson:1977:BSA, 20692 author = "J. M. Robson", 20693 title = "A Bounded Storage Algorithm for Copying Cyclic Structures", 20694 journal = j-CACM, 20695 volume = "20", 20696 number = "6", 20697 pages = "431--433", 20698 month = jun, 20699 year = "1977", 20700 CODEN = "CACMA2", 20701 ISSN = "0001-0782", 20702 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20703 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 20704 abstract = "A new algorithm is presented which copies cyclic list structures using bounded workspace and linear time. Unlike a previous similar algorithm, this one makes no assumptions about the storage allocation system in use and uses only operations likely to be available in a high-level language. The distinctive feature of this algorithm is a technique for traversing the structure twice, using the same spanning tree in each case, first from left to right and then from right to left.", 20705 acknowledgement = ack-nhfb, 20706 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 20707 classification = "723", 20708 corpsource = "Univ. of Lancaster, Lancaster, UK", 20709 journalabr = "Commun ACM", 20710 keywords = "bounded storage algorithm; computer programming --- Subroutines; computer programs; computer systems programming; copying; cyclic structures; list; list processing; structures", 20711 treatment = "P Practical", 20712} 20713 20714@Article{Bird:1977:NRE, 20715 author = "R. S. Bird", 20716 title = "Notes on Recursion Elimination", 20717 journal = j-CACM, 20718 volume = "20", 20719 number = "6", 20720 pages = "434--439", 20721 month = jun, 20722 year = "1977", 20723 CODEN = "CACMA2", 20724 ISSN = "0001-0782", 20725 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20726 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib", 20727 abstract = "Various methods of recursion elimination are applied to the schematic recursive procedure: proc S(x); px then N(x); S(fx); S(gx); M(x) fi. Procedures with this general form arise in connection with tree traversal and sorting algorithms. Each method of recursion removal involves the use of one or more stacks, and the solutions are compared on the basis of their running time.", 20728 acknowledgement = ack-nhfb, 20729 classcodes = "C4240 (Programming and algorithm theory)", 20730 classification = "721; 723", 20731 corpsource = "Univ. of Reading, Reading, UK", 20732 journalabr = "Commun ACM", 20733 keywords = "automata theory --- Recursive Functions; computer programming; computer systems programming --- Sorting; functional; programming theory; recursion elimination; running time; sorting algorithms; stacks; tree traversal", 20734 treatment = "T Theoretical or Mathematical", 20735} 20736 20737@Article{Warren:1977:FRW, 20738 author = "Henry S. {Warren, Jr.}", 20739 title = "Functions Realizable with Word-Parallel Logical and Two's-Complement Addition Instructions", 20740 journal = j-CACM, 20741 volume = "20", 20742 number = "6", 20743 pages = "439--441", 20744 month = jun, 20745 year = "1977", 20746 CODEN = "CACMA2", 20747 ISSN = "0001-0782", 20748 MRclass = "94A20", 20749 MRnumber = "58 26591", 20750 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20751 bibsource = "Compendex database", 20752 abstract = "A theorem is given for deducing whether or not a given function can be computed through the use of ``programming tricks'' involving binary numbers. This is followed by an efficient implementation of sign propagation that does not use shifting instructions or branching instructions. The sign-propagation device and a given expression for mixed length adds and subtracts are used in an experimental compiler currently being developed for translating PL/I to microcode for a variety of machines.", 20753 acknowledgement = ack-nhfb, 20754 classcodes = "C5230 (Digital arithmetic methods); C6130 (Data handling techniques)", 20755 classification = "722; 723", 20756 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 20757 journalabr = "Commun ACM", 20758 keywords = "addition instructions; computer architecture --- Microprogramming; computer metatheory; computer programming; digital arithmetic; functions realisable; two's complement; word parallel logical instructions", 20759 treatment = "P Practical", 20760} 20761 20762@Article{Mamrak:1977:DRT, 20763 author = "Sandra A. Mamrak", 20764 title = "Dynamic Response Time Prediction for Computer Networks", 20765 journal = j-CACM, 20766 volume = "20", 20767 number = "7", 20768 pages = "461--468", 20769 month = jul, 20770 year = "1977", 20771 CODEN = "CACMA2", 20772 ISSN = "0001-0782", 20773 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20774 bibsource = "Compendex database", 20775 abstract = "Five interactive systems currently available on the ARPA network are compared. A system environment is defined in which response time measurements can be made, and statistical, simulation, and analytical tools are used to describe and then predict the response time behavior. The effect of network queueing delays is discussed. Finally, a dynamic response time monitor for ARPA network users is proposed based on the success of the response time prediction methodologies and models.", 20776 acknowledgement = ack-nhfb, 20777 classcodes = "C5620 (Computer networks and techniques)", 20778 classification = "722; 723; 922", 20779 corpsource = "Ohio State Univ., Columbus, OH, USA", 20780 journalabr = "Commun ACM", 20781 keywords = "ARPA; computer networks; computer simulation; computer systems, digital --- Fast Response Capability; dynamic prediction; mathematical models; response time; statistical methods; time-sharing systems", 20782 treatment = "P Practical", 20783} 20784 20785@Article{Ruschitzka:1977:UAS, 20786 author = "Manfred Ruschitzka and R. S. Fabry", 20787 title = "A Unifying Approach to Scheduling", 20788 journal = j-CACM, 20789 volume = "20", 20790 number = "7", 20791 pages = "469--477", 20792 month = jul, 20793 year = "1977", 20794 CODEN = "CACMA2", 20795 ISSN = "0001-0782", 20796 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20797 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib", 20798 abstract = "This paper presents a scheme for classifying scheduling algorithms based on an abstract model of a scheduling system which formalizes the notion of priority. Various classes of scheduling algorithms are defined and related to existing algorithms. A criterion for the implementation efficiency of an algorithm is developed and results in the definition of time-invariant algorithms, which include most of the commonly implemented ones. For time-invariant algorithms, the dependence of processing rates on priorities is derived. The abstract model provides a framework for implementing flexible schedulers in real operating systems. The policy-driven scheduler of Bernstein and Sharp is discussed as an example of such an implementation.", 20799 acknowledgement = ack-nhfb, 20800 classcodes = "C5420 (Mainframes and minicomputers)", 20801 classification = "723; 922", 20802 corpsource = "Rutgers Univ., New Brunswick, NJ, USA", 20803 country = "USA", 20804 descriptors = "Scheduling; queueing discipline; priority; processor sharing; process management;", 20805 enum = "2645", 20806 journalabr = "Commun ACM", 20807 keywords = "algorithms; computer operating systems --- Scheduling; computer programming --- Subroutines; computer systems programming; implementation efficiency; operating systems; priority; probability --- Queueing Theory; processor sharing; scheduling; scheduling algorithms; scheduling models; time-sharing systems; unifying approach", 20808 language = "English", 20809 references = "0", 20810 treatment = "P Practical; T Theoretical or Mathematical", 20811} 20812 20813@Article{Tajibnapis:1977:CPT, 20814 author = "William D. Tajibnapis", 20815 title = "A Correctness Proof of a Topology Information Maintenance Protocol for a Distributed Computer Network", 20816 journal = j-CACM, 20817 volume = "20", 20818 number = "7", 20819 pages = "477--485", 20820 month = jul, 20821 year = "1977", 20822 CODEN = "CACMA2", 20823 ISSN = "0001-0782", 20824 MRclass = "94A20", 20825 MRnumber = "58 4703", 20826 mrreviewer = "Fan R. K. Chung", 20827 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20828 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib", 20829 abstract = "One of the major constraints on a topology information scheme is that it may not involve a central controller. The Topology Information Protocol that was implemented on the MERIT Computer Network is presented and explained; this protocol is quite general and could be implemented on any computer network. It is based on Baran's ``Hot Potato Heuristic Routing Doctrine.'' A correctness proof of this Topology Information Protocol is also presented.", 20830 acknowledgement = ack-nhfb, 20831 annote = "(VBI-001559)", 20832 classcodes = "C5620 (Computer networks and techniques)", 20833 classification = "722; 723", 20834 country = "USA", 20835 descriptors = "Protocol verification;", 20836 enum = "11285", 20837 journalabr = "Commun ACM", 20838 keywords = "computer networks; computer programming --- Subroutines; computer systems, digital --- Multiprocessing; computers --- Data Communication Systems; correctness proof; distributed computer network; protocol; protocols; topology information maintenance", 20839 language = "English", 20840 references = "0", 20841 treatment = "T Theoretical or Mathematical", 20842} 20843 20844@Article{Heckel:1977:TCS, 20845 author = "Paul G. Heckel and Butler W. Lampson", 20846 title = "A terminal-oriented communication system", 20847 journal = j-CACM, 20848 volume = "20", 20849 number = "7", 20850 pages = "486--494", 20851 month = jul, 20852 year = "1977", 20853 CODEN = "CACMA2", 20854 ISSN = "0001-0782", 20855 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20856 bibsource = "Compendex database", 20857 abstract = "This paper describes a system for full-duplex communication between a time-shared computer and its terminals. The system consists of a communications computer directly connected to the time-shared system, a number of small remote computers to which the terminals are attached, and connecting medium speed telephone lines. It can service a large number of terminals of various types. The overall system design is presented along with the algorithms used to solve three specific problems: local echoing, error detection and correction on the telephone lines, and multiplexing of character output.", 20858 acknowledgement = ack-nhfb, 20859 classcodes = "B6210L (Computer communications); C5600 (Data communication equipment and techniques)", 20860 classification = "718; 722; 723", 20861 corpsource = "Interactive Systems Consultants, Palo Alto, CA, USA", 20862 journalabr = "Commun ACM", 20863 keywords = "character output; communication system; computer networks; computer programming --- Subroutines; computers --- Data Communication Systems; data communication systems; detection and correction; digital communication systems --- Computer Interfaces; error; full duplex; local echoing; multiplexing; system design; terminal oriented; time sharing; time-sharing systems", 20864 treatment = "P Practical", 20865} 20866 20867@Article{Schneider:1977:SIT, 20868 author = "Ben Ross {Schneider, Jr.} and Reid M. Watts", 20869 title = "{SITAR}: an Interactive Text Processing System for Small Computers", 20870 journal = j-CACM, 20871 volume = "20", 20872 number = "7", 20873 pages = "495--499", 20874 month = jul, 20875 year = "1977", 20876 CODEN = "CACMA2", 20877 ISSN = "0001-0782", 20878 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20879 bibsource = "Compendex database", 20880 abstract = "SITAR, a System for Interactive Text-editing, Analysis, and Retrieval, is in many ways comparable to interactive bibliographical search and retrieval systems, but has several additional features. It is implemented on a PDP\slash 11 time-sharing computer invoked by a CRT with microprogrammed editing functions. Extensive experience with SITAR shows that the combined powers of simple commands, string orientation, circular file structure, a CRT with local memory, and conversational computing produce a system much more powerful than the sum of its parts.", 20881 acknowledgement = ack-nhfb, 20882 classcodes = "C6130 (Data handling techniques); C7250 (Information storage and retrieval)", 20883 classification = "722; 723; 901", 20884 corpsource = "Lawrence Univ., Appleton, WI, USA", 20885 journalabr = "Commun ACM", 20886 keywords = "circular file structure; computer systems, digital; computers, miniature --- Applications; conversational computing; CRT with local memory; data processing --- Humanities Applications; information retrieval; information retrieval systems; interactive text processing system; orientation; simple commands; SITAR; small computers; string; text analysis; text editing; text handling", 20887 treatment = "P Practical", 20888} 20889 20890@Article{Kessels:1977:AEQ, 20891 author = "J. L. W. Kessels", 20892 title = "Alternative to Event Queues for Synchronization in Monitors", 20893 journal = j-CACM, 20894 volume = "20", 20895 number = "7", 20896 pages = "500--503", 20897 month = jul, 20898 year = "1977", 20899 CODEN = "CACMA2", 20900 ISSN = "0001-0782", 20901 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20902 bibsource = "Compendex database", 20903 abstract = "In the monitor concept, as proposed by Brinch Hansen and Hoare, event queues are used for synchronization. This paper describes another synchronizing primitive which is nearly as expressive as the conditional wait, but can be implemented more efficiently. An implementation of this primitive in terms of P and V operations is given together with a correctness proof. Two examples are presented: the readers and writers problem and the problem of information streams sharing a finite buffer pool.", 20904 acknowledgement = ack-nhfb, 20905 classcodes = "C6150J (Operating systems)", 20906 classification = "723", 20907 corpsource = "Philips Res. Labs., Eindhoven, Netherlands", 20908 journalabr = "Commun ACM", 20909 keywords = "alternative; computer operating systems --- Scheduling; computer programming --- Subroutines; computer systems programming; event queues; monitors; operating systems (computers); synchronization", 20910 treatment = "T Theoretical or Mathematical", 20911} 20912 20913@Article{Denning:1977:CPS, 20914 author = "Dorothy E. Denning and Peter J. Denning", 20915 title = "Certification of Programs for Secure Information Flow", 20916 journal = j-CACM, 20917 volume = "20", 20918 number = "7", 20919 pages = "504--513", 20920 month = jul, 20921 year = "1977", 20922 CODEN = "CACMA2", 20923 ISSN = "0001-0782", 20924 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20925 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 20926 abstract = "An information flow policy specifies a set of security classes for information, a flow relation defining permissible flows among these classes, and a method of binding each storage object to some class. This paper presents a compile-time mechanism that certifies a program only if it specifies no flows in violation of the flow policy. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis phase of most existing compilers. Appropriate semantics are presented and proved correct. An important application is the confinement problem. The mechanism can prove that a program cannot cause supposedly nonconfidential results to depend on confidential input data.", 20927 acknowledgement = ack-nhfb, 20928 classcodes = "C6150C (Compilers, interpreters and other processors)", 20929 classification = "723", 20930 corpsource = "Purdue Univ., West Lafayette, IN, USA", 20931 journalabr = "Commun ACM", 20932 keywords = "certification mechanism; compilers; computer operating systems --- Program Compilers; data processing; lattice structure; program compilers; programs; secure information flow; security of data", 20933 treatment = "P Practical; T Theoretical or Mathematical", 20934} 20935 20936@Article{Barth:1977:SGC, 20937 author = "Jeffrey M. Barth", 20938 title = "Shifting Garbage Collection Overhead to Compile Time", 20939 journal = j-CACM, 20940 volume = "20", 20941 number = "7", 20942 pages = "513--518", 20943 month = jul, 20944 year = "1977", 20945 CODEN = "CACMA2", 20946 ISSN = "0001-0782", 20947 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20948 bibsource = "Compendex database", 20949 abstract = "The paper assumes a transaction oriented collection scheme, as proposed by Deutsch and Bobrow, the necessary features of which are summarized. Implementing the described optimization requires global flow analysis to be performed on the source program. It is shown that at compile time certain program actions that affect the reference counts of cells can be deduced. This information is used to find actions that cancel when the code is executed and those that can be grouped to achieve improved efficiency.", 20950 acknowledgement = ack-nhfb, 20951 classcodes = "C6120 (File organisation)", 20952 classification = "723", 20953 corpsource = "Univ. of California, Berkeley, CA, USA", 20954 journalabr = "Commun ACM", 20955 keywords = "automatic storage; compile time; computer operating systems; computer programming languages --- List Processing; flow analysis; garbage collection overhead; global; optimization; reclamation; storage management; transaction oriented collection scheme", 20956 treatment = "P Practical", 20957} 20958 20959@Article{Ashcroft:1977:LNL, 20960 author = "E. A. Ashcroft and W. W. Wadge", 20961 title = "{Lucid}, a Nonprocedural Language with Iteration", 20962 journal = j-CACM, 20963 volume = "20", 20964 number = "7", 20965 pages = "519--526", 20966 month = jul, 20967 year = "1977", 20968 CODEN = "CACMA2", 20969 ISSN = "0001-0782", 20970 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20971 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Pfpbib.bib", 20972 abstract = "Lucid is a formal system in which programs can be written and proofs of programs carried out. The proofs are particularly easy to follow and straight-forward to produce because the statements in a Lucid program are simply axioms from which the proof proceeds by (almost) conventional logic reasoning, with the help of a few axioms and rules of inference for the special lucid functions. As a programming language, Lucid is unconventional because, among other things, the order of statements is irrelevant and assignment statements are equations. Nevertheless, Lucid programs need not look much different than iterative programs in a conventional structured programming language using assignment and conditional statements and loops.", 20973 acknowledgement = ack-nhfb, 20974 classcodes = "C4210 (Formal logic); C6140D (High level languages)", 20975 classification = "723", 20976 corpsource = "Univ. of Waterloo, Waterloo, Ont., Canada", 20977 journalabr = "Commun ACM", 20978 keywords = "computer metatheory --- Algorithmic Languages; computer programming --- Reliability; computer programming languages; Dataflow; formal languages; formal system; Formal Systems; iteration; Lucid; lucid; nonprocedural language; proofs; Proving; Semantics; structured programming", 20979 treatment = "P Practical; T Theoretical or Mathematical", 20980} 20981 20982@Article{Brownlee:1977:AIS, 20983 author = "J. Nevil Brownlee", 20984 title = "An {Algol-based} implementation of {SNOBOL} 4 patterns", 20985 journal = j-CACM, 20986 volume = "20", 20987 number = "7", 20988 pages = "527--529", 20989 month = jul, 20990 year = "1977", 20991 CODEN = "CACMA2", 20992 ISSN = "0001-0782", 20993 bibdate = "Tue Mar 25 13:26:09 MST 1997", 20994 bibsource = "Compendex database", 20995 abstract = "When a string appears as the subject of a SNOBOL4 statement, it may be scanned to see whether or not it contains a specified pattern. However, since the scanner is fundamentally an interpreter (using pattern graphs as its input code), pattern matching appears to be a time-consuming process. This paper describes an alternative approach in which SNOBOL4 patterns are compiled into Algol functions, which can be combined into larger (more complicated) patterns, and which are directly executed. It was developed as part of the implementation of ``Snobal\slash 67'', a Burroughs B6700 compiler for a SNOBAL4-like language.", 20996 acknowledgement = ack-nhfb, 20997 classcodes = "C6140D (High level languages)", 20998 classification = "723", 20999 corpsource = "Univ. of Auckland, Private Bag, Auckland, New Zealand", 21000 journalabr = "Commun ACM", 21001 keywords = "ALGOL; compiled; computer operating systems --- Program Compilers; computer programming languages; implementation; pattern recognition systems; patterns; procedure oriented languages; SNOBOL 4", 21002 treatment = "P Practical", 21003} 21004 21005@Article{Geschke:1977:EEM, 21006 author = "Charles M. Geschke and James H. {Morris, Jr.} and Edwin H. Satterthwaite", 21007 title = "Early Experience with {Mesa}", 21008 journal = j-CACM, 21009 volume = "20", 21010 number = "8", 21011 pages = "540--553", 21012 month = aug, 21013 year = "1977", 21014 CODEN = "CACMA2", 21015 ISSN = "0001-0782", 21016 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21017 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib and ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 21018 abstract = "The experiences of Mesa's first users --- primarily its implementors --- are discussed, and some implications for Mesa and similar programming languages are suggested. The specific topics addressed are: module structure and its use in defining abstractions, data-structuring facilities in Mesa, an equivalence algorithm for types and type coercions, the benefits of the type system and why it is breached occasionally, and the difficulty of making the treatment of variant records safe.", 21019 acknowledgement = ack-nhfb, 21020 classcodes = "C6140D (High level languages); C6150 (Systems software)", 21021 classification = "723", 21022 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 21023 journalabr = "Commun ACM", 21024 keywords = "abstractions; computer programming languages; computer systems programming; data processing --- Data Structures; data structuring; defining; equivalence algorithm; mesa; Mesa; module structure; olit-oopl mesa; problem oriented languages; programming languages; systems programming; type coercions; types", 21025 treatment = "P Practical", 21026} 21027 21028@Article{Shaw:1977:AVA, 21029 author = "Mary Shaw and William A. Wulf and Ralph L. London", 21030 title = "Abstraction and Verification in {Alphard}: Defining and Specifying Iteration and Generators", 21031 journal = j-CACM, 21032 volume = "20", 21033 number = "8", 21034 pages = "553--564", 21035 month = aug, 21036 year = "1977", 21037 CODEN = "CACMA2", 21038 ISSN = "0001-0782", 21039 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21040 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib and ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib", 21041 abstract = "The Alphard ``form'' provides the programmer with a great deal of control over the implementation of abstract data types. In this paper the abstraction techniques are extended from simple data representation and function definition to the iteration statement, the most important point of interaction between data and the control structure of the language itself. A means of specializing Alphard's loops to operate on abstract entities without explicit dependence on the representation of those entities is in troduced. \par Specification and verification techniques that allow the properties of the generators for such iterations to be expressed in the form of proof rules are developed. \par Results are obtained that for common special cases of these loops are essentially identical to the corresponding constructs in other languages. A means of showing that a generator will terminate is also provided.", 21042 acknowledgement = ack-nhfb, 21043 classcodes = "C6140D (High level languages)", 21044 classification = "723", 21045 corpsource = "Dept. of Computer Sci., Carnegie-Mellon Univ., Schenley Park, Pittsburgh, PA, USA", 21046 journalabr = "Commun ACM", 21047 keywords = "abstract data types; abstraction and representation; Alphard; assertions; computer programming; computer programming languages; control specialization; correctness; defining; generators; invariants; iteration; iteration statements; language; modular decomposition; olit lang alphard data abstraction; program specifications; programmer; programming languages; programming methodology; proofs of correctness; specifying; types; verification", 21048 treatment = "P Practical", 21049} 21050 21051@Article{Liskov:1977:AMC, 21052 author = "Barbara Liskov and Alan Snyder and Russell Atkinson and Craig Schaffert", 21053 title = "Abstraction Mechanisms in {CLU}", 21054 journal = j-CACM, 21055 volume = "20", 21056 number = "8", 21057 pages = "564--576", 21058 month = aug, 21059 year = "1977", 21060 CODEN = "CACMA2", 21061 ISSN = "0001-0782", 21062 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21063 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 21064 note = "Also published in/as: In ``Readings in Object-Oriented Database Systems'' edited by S.Zdonik and D.Maier, Morgan Kaufman, 1990.", 21065 abstract = "CLU is a new programming language designed to support the use of abstractions in program construction. Work in programming methodology has led to the realization that three kinds of abstractions --- procedural, control, and especially data abstractions --- are useful in the programming process. Of these, only the procedural abstraction is supported well by conventional languages, through the procedure or subroutine. CLU provides, in addition to procedures, novel linguistic mechanisms that support the use of data and control abstractions. This paper provides an introduction to the abstractions mechanisms in CLU.", 21066 acknowledgement = ack-nhfb, 21067 classcodes = "C6140D (High level languages)", 21068 classification = "723", 21069 corpsource = "Lab. for Computer Sci., MIT, Cambridge, MA, USA", 21070 journalabr = "Commun ACM", 21071 keywords = "abstractions; CLU; computer programming; computer programming languages; construction; linguistic mechanisms; program; programming language; programming languages", 21072 treatment = "P Practical", 21073} 21074 21075@Article{Wirth:1977:TDR, 21076 author = "Niklaus Wirth", 21077 title = "Toward a Discipline of Real-Time Programming", 21078 journal = j-CACM, 21079 volume = "20", 21080 number = "8", 21081 pages = "577--583", 21082 month = aug, 21083 year = "1977", 21084 CODEN = "CACMA2", 21085 ISSN = "0001-0782", 21086 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21087 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/Discrete.event.bib", 21088 abstract = "Programming is divided into three major categories with increasing complexity of reasoning in program validation: sequential programming, multiprogramming, and real-time programming. By adhering to a strict programming discipline and by using a suitable high-level language molded after this discipline, the complexity of reasoning about concurrency and execution time constraints may be drastically reduced. This may be the only practical way to make real-time systems analytically verifiable and ultimately reliable. A possible discipline is outlined and expressed in terms of the language Modula.", 21089 acknowledgement = ack-nhfb, 21090 classcodes = "C6110 (Systems analysis and programming); C6150J (Operating systems)", 21091 classification = "722; 723", 21092 corpsource = "ETH, Zurich, Switzerland", 21093 journalabr = "Commun ACM", 21094 keywords = "computer programming languages; computer systems, digital; concurrency; discipline; execution time; Modula; multiprogramming; online operation; program testing; programming; real time", 21095 treatment = "P Practical", 21096} 21097 21098@Article{Gannon:1977:EED, 21099 author = "J. D. Gannon", 21100 title = "An experimental evaluation of data type conventions", 21101 journal = j-CACM, 21102 volume = "20", 21103 number = "8", 21104 pages = "584--595", 21105 month = aug, 21106 year = "1977", 21107 CODEN = "CACMA2", 21108 ISSN = "0001-0782", 21109 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21110 bibsource = "Compendex database", 21111 abstract = "This paper discusses an experiment that compares the programming reliability of subjects using a statically typed language and a ``typeless'' language. Analysis of the number of errors and the number of runs containing errors shows that, at least in one environment, the use of a statically typed language can increase programming reliability.", 21112 acknowledgement = ack-nhfb, 21113 classcodes = "C6140D (High level languages)", 21114 classification = "723", 21115 corpsource = "Dept. of Computer Sci., Univ. of Maryland, College Park, MD, USA", 21116 journalabr = "Commun ACM", 21117 keywords = "computer programming languages; data type conventions; data types; evaluation; programming languages; programming reliability", 21118 treatment = "X Experimental", 21119} 21120 21121@Article{Franta:1977:EDS, 21122 author = "W. R. Franta and Kurt Maly", 21123 title = "An Efficient Data Structure for the Simulation Event Set", 21124 journal = j-CACM, 21125 volume = "20", 21126 number = "8", 21127 pages = "596--602", 21128 month = aug, 21129 year = "1977", 21130 CODEN = "CACMA2", 21131 ISSN = "0001-0782", 21132 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21133 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/simulan.bib and ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib", 21134 abstract = "A new event scheduling algorithm is presented which improves on two aspects of the best of the previously published algorithms. First, the new algorithm's performance is quite insensitive to skewed distributions, and second, its worst-case complexity is O(square root of n), where n is the number of events in the set. Furthermore, tests conducted to estimate the average complexity showed it to be nearly independent of n.", 21135 acknowledgement = ack-nhfb, 21136 classcodes = "C6120 (File organisation)", 21137 classification = "723; 913", 21138 corpsource = "Dept. of Computer Sci., Univ. of Minnesota, Minneapolis, MN, USA", 21139 descriptors = "Simulation; event sequencing; method;", 21140 journalabr = "Commun ACM", 21141 keywords = "algorithm; computer programming --- Subroutines; data processing; data structure; data structures; digital simulation; event scheduling; scheduling; simulation event set", 21142 treatment = "P Practical", 21143} 21144 21145@Article{Lawler:1977:CCS, 21146 author = "Eugene L. Lawler", 21147 title = "Comment on computing the $k$ shortest paths in a graph", 21148 journal = j-CACM, 21149 volume = "20", 21150 number = "8", 21151 pages = "603--604", 21152 month = aug, 21153 year = "1977", 21154 CODEN = "CACMA2", 21155 ISSN = "0001-0782", 21156 MRclass = "68A20 (90B10)", 21157 MRnumber = "58 19354", 21158 mrreviewer = "Colin J. H. McDiarmid", 21159 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21160 acknowledgement = ack-nhfb, 21161 classcodes = "C1160 (Combinatorial mathematics)", 21162 corpsource = "Div. of Computer Sci., Univ. of California, Berkeley, CA, USA", 21163 keywords = "$k$ shortest paths; algorithms; computing; graph; graph theory", 21164 treatment = "T Theoretical or Mathematical", 21165} 21166 21167@Article{Francez:1977:AAK, 21168 author = "N. Francez", 21169 title = "Another advantage of keyword notation for parameter communication with subprograms", 21170 journal = j-CACM, 21171 volume = "20", 21172 number = "8", 21173 pages = "604--605", 21174 month = aug, 21175 year = "1977", 21176 CODEN = "CACMA2", 21177 ISSN = "0001-0782", 21178 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21179 acknowledgement = ack-nhfb, 21180 classcodes = "C6110 (Systems analysis and programming)", 21181 corpsource = "Weizmann Inst. of Sci., Rehovoth, Israel", 21182 keywords = "advantage; keyword notation; parameter communication; structured programming; subprograms", 21183 treatment = "P Practical", 21184} 21185 21186@Article{Rabin:1977:CC, 21187 author = "Michael O. Rabin", 21188 title = "Complexity of Computations", 21189 journal = j-CACM, 21190 volume = "20", 21191 number = "9", 21192 pages = "625--633", 21193 month = sep, 21194 year = "1977", 21195 CODEN = "CACMA2", 21196 ISSN = "0001-0782", 21197 MRclass = "68A20", 21198 MRnumber = "56 10141", 21199 mrreviewer = "Claus-Peter Schnorr", 21200 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21201 bibsource = "Compendex database", 21202 note = "See corrigendum \cite{Rabin:1978:CCC}.", 21203 abstract = "The framework for research in the theory of complexity of computations is described, emphasizing the interrelation between seemingly diverse problems and methods. Illustrative examples of practical and theoretical significance are given. Directions for new research are discussed.", 21204 acknowledgement = ack-nhfb, 21205 classcodes = "C4240 (Programming and algorithm theory)", 21206 classification = "721", 21207 corpsource = "Dept. of Maths., Hebrew Univ. of Jerusalem, Jerusalem, Israel", 21208 journalabr = "Commun ACM", 21209 keywords = "algebraic complexity; algorithmic cost functions; algorithms; automata theory; complexity of computations; computational complexity; intractable problems; probabilistic", 21210 treatment = "E Economic; T Theoretical or Mathematical", 21211} 21212 21213@Article{Scott:1977:LPL, 21214 author = "Dana S. Scott", 21215 title = "Logic and Programming Languages", 21216 journal = j-CACM, 21217 volume = "20", 21218 number = "9", 21219 pages = "634--641", 21220 month = sep, 21221 year = "1977", 21222 CODEN = "CACMA2", 21223 ISSN = "0001-0782", 21224 MRclass = "68A05", 21225 MRnumber = "56 10114", 21226 mrreviewer = "Horst Reichel", 21227 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21228 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 21229 abstract = "Logic has been long interested in whether answers to certain questions are computable in principle, since the outcome puts bounds on the possibilities of formalization. It would seem that the understanding of higher-level program features involves one with infinite objects and forces one to pass through several levels of explanation to go from the conceptual ideas to the final simulation on a real machine. These levels can be made mathematically exact if the right abstractions can be found to represent the necessary structures. In this paper, the author outlines his approach to these problems, specifically his lambda -calculus orientation.", 21230 acknowledgement = ack-nhfb, 21231 classcodes = "C4210 (Formal logic); C6140 (Programming languages)", 21232 classification = "721; 723", 21233 corpsource = "Math. Inst., Univ. of Oxford, Oxford, UK", 21234 journalabr = "Commun ACM", 21235 keywords = "automata theory --- Computability and Decidability; computability and decidability; computability theory; computational linguistics; computer metatheory; computer programming languages; decision methods; formal logic; methods of logic; programming languages; semantical; syntactic formalization; theory", 21236 treatment = "A Application; T Theoretical or Mathematical", 21237} 21238 21239@Article{Austing:1977:GAT, 21240 author = "Richard H. Austing", 21241 title = "The {GRE Advanced Test in Computer Science}", 21242 journal = j-CACM, 21243 volume = "20", 21244 number = "9", 21245 pages = "642--645", 21246 month = sep, 21247 year = "1977", 21248 CODEN = "CACMA2", 21249 ISSN = "0001-0782", 21250 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21251 bibsource = "Compendex database", 21252 abstract = "This report describes the Advanced Test in Computer Science which was recently introduced in the Graduate Record Examination Program. The GRE program is described in general, and, the events leading to the establishment of the Advanced Computer Science Test are discussed. Content specifications and their rationale are given. A set of sample questions is included.", 21253 acknowledgement = ack-nhfb, 21254 classcodes = "C0220 (Computing education and training)", 21255 classification = "723; 901", 21256 corpsource = "Dept. of Computer Sci., Univ. of Maryland, College Park, MD, USA", 21257 journalabr = "Commun ACM", 21258 keywords = "Advanced Test in Computer Science; computer programming; computer science education; education; Examination Program; Graduate Record; questions; rationale; sample; specifications", 21259 treatment = "G General Review; P Practical", 21260} 21261 21262@Article{Scheifler:1977:AIS, 21263 author = "Robert W. Scheifler", 21264 title = "An Analysis of Inline Substitution for a Structured Programming Language", 21265 journal = j-CACM, 21266 volume = "20", 21267 number = "9", 21268 pages = "647--654", 21269 month = sep, 21270 year = "1977", 21271 CODEN = "CACMA2", 21272 ISSN = "0001-0782", 21273 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21274 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/compiler.bib", 21275 abstract = "An optimization technique known as inline substitution is analyzed. The optimization consists of replacing a procedure invocation by a modified copy of the procedure body. The general problem of using inline substitution to minimize execution time subject to size constraints is formulated, and an approximate algorithmic solution is proposed. The algorithm depends on run-time statistics about the program to be optimized. Preliminary results for the CLU structured programming language indicate that, in programs with a low degree of recursion, over 90 percent of all procedure calls can be eliminated, with little increase in the size of compiled code and a small savings in execution time.", 21276 acknowledgement = ack-nhfb, 21277 classcodes = "C6140 (Programming languages); C6150C (Compilers, interpreters and other processors)", 21278 classification = "723", 21279 corpsource = "MIT, Cambridge, MA, USA", 21280 journalabr = "Commun ACM", 21281 keywords = "algorithmic solution; compiled code; computational linguistics; computer operating systems; computer programming --- Structured Programming; computer programming languages; execution time; inline substitution; languages; optimization technique; procedure calls; program compilers; programming; run time statistics; structured programming; structured programming language", 21282 treatment = "P Practical", 21283} 21284 21285@Article{Gifford:1977:HEP, 21286 author = "David K. Gifford", 21287 title = "Hardware Estimation of a Process' Primary Memory Requirements", 21288 journal = j-CACM, 21289 volume = "20", 21290 number = "9", 21291 pages = "655--663", 21292 month = sep, 21293 year = "1977", 21294 CODEN = "CACMA2", 21295 ISSN = "0001-0782", 21296 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21297 bibsource = "Compendex database", 21298 abstract = "A minor hardware extension to the Honeywell 6180 processor is demonstrated to allow the primary memory requirements of a process in Multics to be approximated. The additional hardware required for this estimate to be computed consists of a program accessible register containing the miss rate of the associative memory used for page table words. This primary memory requirement estimate was employed in an experimental version of Multics to control the level of multiprogramming in the system and to bill for memory usage. The resulting system's tuning parameters display configuration insensitivity, and it is conjectured that the system would also track shifts in the referencing characteristics of its workload and keep the system in tune.", 21299 acknowledgement = ack-nhfb, 21300 classcodes = "C5220 (Computer architecture); C6150J (Operating systems)", 21301 classification = "722; 723", 21302 corpsource = "MIT, Cambridge, MA, USA", 21303 journalabr = "Commun ACM", 21304 keywords = "associative memory; computer systems programming --- Multiprogramming; configuration insensitivity; content-addressable storage; data storage, digital; hardware extension; memory usage; Multics; multiprogramming; primary memory requirements; program accessible register; referencing characteristics; tuning; tuning parameters; virtual storage", 21305 treatment = "P Practical", 21306} 21307 21308@Article{Mairson:1977:SNU, 21309 author = "Harry G. Mairson", 21310 title = "Some New Upper Bounds on the Generation of Prime Numbers", 21311 journal = j-CACM, 21312 volume = "20", 21313 number = "9", 21314 pages = "664--669", 21315 month = sep, 21316 year = "1977", 21317 CODEN = "CACMA2", 21318 ISSN = "0001-0782", 21319 MRclass = "68A20 (10A25 10-04)", 21320 MRnumber = "56 4236", 21321 mrreviewer = "G. Wechsung", 21322 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21323 bibsource = "Compendex database", 21324 abstract = "Given an integer N, what is the computational complexity of finding all the primes less than N? A modified sieve of Eratosthenes using doubly linked lists yields an algorithm of O//A(N) arithmetic complexity. This upper bound is shown to be equivalent to the theoretical lower bound for sieve methods without preprocessing. Use of preprocessing techniques involving space-time and additive-multiplicative tradeoffs reduces this upper bound to O//A(N/log logN) and the bit complexity to O//B(N logN log log logN). A storage requirement is described using O//B(N logN\slash log logN) bits as well.", 21325 acknowledgement = ack-nhfb, 21326 classcodes = "C5230 (Digital arithmetic methods)", 21327 classification = "723; 921", 21328 corpsource = "Calhoun College, Yale Univ., New Haven, CT, USA", 21329 journalabr = "Commun ACM", 21330 keywords = "computational complexity; computer programming --- Subroutines; generation of prime numbers; mathematical techniques; methods; number theory; preprocessing techniques; requirement; sieve; storage; upper bound", 21331 treatment = "T Theoretical or Mathematical", 21332} 21333 21334@Article{McCreight:1977:PBT, 21335 author = "Edward M. McCreight", 21336 title = "Pagination of {B*}-Trees with Variable-Length Records", 21337 journal = j-CACM, 21338 volume = "20", 21339 number = "9", 21340 pages = "670--674", 21341 month = sep, 21342 year = "1977", 21343 CODEN = "CACMA2", 21344 ISSN = "0001-0782", 21345 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21346 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 21347 abstract = "A strategy is presented for pagination of B*-trees with variable-length records. If records of each length are uniformly distributed within the file, and if a wide distribution of record lengths exists within the file, then this strategy results in shallow trees with fast access times. The performance of this strategy in an application is presented, compared with that of another strategy, and analyzed.", 21348 acknowledgement = ack-nhfb, 21349 classcodes = "C6120 (File organisation)", 21350 classification = "723; 901; 921", 21351 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 21352 journalabr = "Commun ACM", 21353 keywords = "data base systems; data processing --- Data Handling; data searching; information retrieval systems; mathematical techniques --- Trees", 21354 keywords = "B* tree; fast access times; file; file organisation; pagination; shallow trees; strategy; trees (mathematics); variable length records", 21355 treatment = "P Practical", 21356} 21357 21358@Article{Fuchs:1977:OSR, 21359 author = "H. Fuchs and Z. M. Kedem and S. P. Uselton", 21360 title = "Optimal Surface Reconstruction from Planar Contours", 21361 journal = j-CACM, 21362 volume = "20", 21363 number = "10", 21364 pages = "693--702", 21365 month = oct, 21366 year = "1977", 21367 CODEN = "CACMA2", 21368 ISSN = "0001-0782", 21369 MRclass = "68A45", 21370 MRnumber = "58 25163", 21371 mrreviewer = "Giorgio Balconi", 21372 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21373 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.77.bib and ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/77.bib", 21374 abstract = "This paper presents a general solution to the problem of constructing a surface over a set of cross-sectional contours. This surface, to be composed of triangular tiles, is constructed by separately determining an optimal surface between each pair of consecutive contours. Determining such a surface is reduced to the problem of finding certain minimum cost cycles in a directed toroidal graph. A new fast algorithm for finding such cycles is utilized. Also developed is a closed-form expression, in terms of the number of contour points, for an upper bound on the number of operations required to execute the algorithm. An illustrated example which involves the construction of a minimum area surface describing a human head is included.", 21375 acknowledgement = ack-nhfb, 21376 annote = "Also in Computer Graphics (Special issue of SIGGRAPH '77, preliminary papers), pp. 11--24.", 21377 classcodes = "C6130B (Graphics techniques)", 21378 classification = "723", 21379 corpsource = "Univ. of Texas, Dallas, TX, USA", 21380 journalabr = "Commun ACM", 21381 keywords = "computer graphics; optimal; planar contours; reconstruction of objects; surface reconstruction; triangular tiles", 21382 treatment = "T Theoretical or Mathematical", 21383} 21384 21385@Article{Wu:1977:ICG, 21386 author = "Sheng-Chuan C. Wu and John F. Abel and Donald P. Greenberg", 21387 title = "An Interactive Computer Graphics Approach to Surface Representation", 21388 journal = j-CACM, 21389 volume = "20", 21390 number = "10", 21391 pages = "703--712", 21392 month = oct, 21393 year = "1977", 21394 CODEN = "CACMA2", 21395 ISSN = "0001-0782", 21396 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21397 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib and ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.77.bib", 21398 abstract = "An interactive computer graphics method has been developed for the rapid generation of arbitrary shaped three-dimensional surfaces. The method is a synthesis of spline theory and algorithms, an interactive means for man-machine communication, and software for static or dynamic graphics display. The basic technique employed is a modified lofting method in which sectional curves are represented by uniform B-splines and the surface is interpolated between sections by Cardinal splines. Among the features of this method are algorithms which enable interactive modification of the B-spline representation of the sectional curves. At all stages of the process, the spatial information is graphically displayed to the user. Complex surfaces can be created by the combination of a number of shapes that have been separately generated and automatically joined. The system has been successfully interfaced to a variety of analytical routines for structural, medical and graphical applications.", 21399 acknowledgement = ack-nhfb, 21400 annote = "Also in Computer Graphics (Special issue of SIGGRAPH '77, preliminary papers), pp. 1--10. An interactive computer graphics method has been developed for the rapid generation of arbitrary shaped three-dimensional surfaces. The method is a synthesis of spline theory and algorithms, an interactive means for man-machine communication, and software for static or dynamic graphics display. The basic technique employed is a modified lofting method in which sectional curves are represented by uniform B-splines and the surface is interpolated", 21401 classcodes = "C6130B (Graphics techniques)", 21402 classification = "723", 21403 corpsource = "Cornell Univ., Ithaca, NY, USA", 21404 descriptors = "Graphics; two-dimensional plot; three-dimensional plot; method; process interaction; interpolation; human factors; spline; finite element input method", 21405 journalabr = "Commun ACM", 21406 keywords = "computer graphics; interactive computer graphics; representation; representation graphic; representation surface geometry; splines; splines (mathematics); surface representation", 21407 treatment = "A Application; T Theoretical or Mathematical", 21408} 21409 21410@Article{Rosen:1977:HLD, 21411 author = "Barry K. Rosen", 21412 title = "High-Level Data Flow Analysis", 21413 journal = j-CACM, 21414 volume = "20", 21415 number = "10", 21416 pages = "712--724", 21417 month = oct, 21418 year = "1977", 21419 CODEN = "CACMA2", 21420 ISSN = "0001-0782", 21421 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21422 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib", 21423 abstract = "In contrast to the predominant use of low-level in termediate text, high-level data flow analysis deals with programs essentially at source level and exploits the control flow information implicit in the parse tree. The need for high-level flow analysis arises from several aspects of recent work on advanced methods of program certification and optimization. \par This paper proposes a simple general method of high-level data flow analysis that allows free use of escape and jump statements, avoids large graphs when compiling large programs, facilitates updating of data flow information to reflect program changes, and derives new global information helpful in solving many familiar global flow analysis problems. An illustrative application to live variable analysis is presented. \par Many of the graphs involved are constructed and analyzed before any programs are compiled, thus avoiding certain costs that low-level methods incur repeatedly at compile time.", 21424 acknowledgement = ack-nhfb, 21425 classcodes = "C4240 (Programming and algorithm theory); C6110 (Systems analysis and programming)", 21426 classification = "723", 21427 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 21428 journalabr = "Commun ACM", 21429 keywords = "computer programming --- Structural Programming; computer programming languages; control flow graph; data flow analysis; data processing --- Data Reduction and Analysis; escapes; exits; goto statements; high-level language; jumps; structured programming", 21430 keywords = "data flow analysis; escape; high; jump; level; programs; statements; structured programming", 21431 treatment = "T Theoretical or Mathematical", 21432} 21433 21434@Article{Montangero:1977:TCS, 21435 author = "C. Montangero and G. Pacini and F. Turini", 21436 title = "Two-Level Control Structure for Nondeterministic Programming", 21437 journal = j-CACM, 21438 volume = "20", 21439 number = "10", 21440 pages = "725--730", 21441 month = oct, 21442 year = "1977", 21443 CODEN = "CACMA2", 21444 ISSN = "0001-0782", 21445 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21446 bibsource = "Compendex database", 21447 abstract = "The basic ideas of nondeterministic programming are critically reconsidered to single out a proper attitude and programming style for languages allowing direct control of nondeterministic features. The proposed attitude aims at retaining the purity of the nondeterministic formulation of search processes on one level (the attempt level), deferring the coordination of problem solving efforts to another (the choice level). The feasibility of recognizing these two levels is discussed, stressing that the structure to be managed at the choice level is a tree of contexts. The leaves are computational environments, each holding an alternative under inspection, while the other nodes are associated with choice points. According to the proposed programming style, a generative function is associated with each choice point, which expresses the desired choice strategy. The main advantage of this approach is the localization of the search strategies: Each nonterminal node of the tree keeps track of the state of the computation as it was when the choice point was last interrogated, holding at the same time the strategy to coordinate the available alternatives. Examples are given in term of ND-Lisp, an extension of Lisp designed and implemented according to these guidelines.", 21448 acknowledgement = ack-nhfb, 21449 classcodes = "C4240 (Programming and algorithm theory)", 21450 classification = "723", 21451 corpsource = "Univ. of Pisa, Pisa, Italy", 21452 journalabr = "Commun ACM", 21453 keywords = "computer programming languages; control structure; languages; nondeterministic programming; programming theory; two level", 21454 treatment = "T Theoretical or Mathematical", 21455} 21456 21457@Article{LaLonde:1977:RRP, 21458 author = "Wilf R. LaLonde", 21459 title = "Regular Right Part Grammars and Their Parsers", 21460 journal = j-CACM, 21461 volume = "20", 21462 number = "10", 21463 pages = "731--741", 21464 month = oct, 21465 year = "1977", 21466 CODEN = "CACMA2", 21467 ISSN = "0001-0782", 21468 MRclass = "68A30", 21469 MRnumber = "58 13974", 21470 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21471 bibsource = "Compendex database", 21472 abstract = "Regular right part (RRP) grammars, which resemble PASCAL syntax diagrams, describe the syntax of programming languages more concisely and more understandably than is possible with CF grammars. Also introduced is a class of parsers, RRP LR(m, k) parsers, which includes the CF LR(k) parsers and provides the same advantages. Informally, an RRP LR(m, k) parser can determine the right end of each handle by considering at most k symbols to the right of the handle and the left end, after the right end has been found, by considering at most m symbols to the left of the handle. A mechanism for determining the left end is required because there is no bound on the length of the handle.", 21473 acknowledgement = ack-nhfb, 21474 classcodes = "C4210 (Formal logic); C4220 (Automata theory)", 21475 classification = "721; 723", 21476 corpsource = "Carleton Univ., Ottawa, Ont., Canada", 21477 journalabr = "Commun ACM", 21478 keywords = "automata theory; computer programming languages; finite automata; finite state machines; grammars; parsers; regular right part; regular right part grammar; RRP grammars", 21479 treatment = "T Theoretical or Mathematical", 21480} 21481 21482@Article{Devillers:1977:GID, 21483 author = "R. Devillers", 21484 title = "Game Interpretation of the Deadlock Avoidance Problem", 21485 journal = j-CACM, 21486 volume = "20", 21487 number = "10", 21488 pages = "741--745", 21489 month = oct, 21490 year = "1977", 21491 CODEN = "CACMA2", 21492 ISSN = "0001-0782", 21493 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21494 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 21495 abstract = "The deadlock avoidance problem may be defined informally as the determination, from some a priori information about the processes, resources, operating system, etc., of the ``safe situations'' which may be realized without endangering the smooth running of the system. When each process specifies its future needs by a flowchart of need-defined steps, a global approach to the phenomenon and its interpretation as a game between the operating system and the processes allows formalization of risk and safety concepts. The bipartite graph representation of this game may then be used to construct explicitly the set of safe states and to study their properties.", 21496 acknowledgement = ack-nhfb, 21497 classcodes = "C4240 (Programming and algorithm theory); C6150J (Operating systems)", 21498 classification = "723; 922", 21499 corpsource = "Free Univ. of Brussels, Brussels, Belgium", 21500 journalabr = "Commun ACM", 21501 keywords = "computer operating systems; deadlock avoidance; multiprogramming; operating system; probability --- Game Theory; processes; resources", 21502 treatment = "T Theoretical or Mathematical", 21503} 21504 21505@Article{Ivie:1977:PWM, 21506 author = "Evan L. Ivie", 21507 title = "Programmer's Workbench --- a Machine for Software Development", 21508 journal = j-CACM, 21509 volume = "20", 21510 number = "10", 21511 pages = "746--753", 21512 month = oct, 21513 year = "1977", 21514 CODEN = "CACMA2", 21515 ISSN = "0001-0782", 21516 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21517 bibsource = "Compendex database", 21518 abstract = "In this paper it is suggested that there are many situations where it would be advantageous to separate the program development and maintenance function onto a specialized computer which is dedicated to that purpose. Such a computer is here called a Programmer's Workbench. The four basic sections of the paper introduce the subject, outline the general concept, discuss areas where such an approach may prove beneficial, and described and operational system utilizing this concept.", 21519 acknowledgement = ack-nhfb, 21520 classcodes = "C5420 (Mainframes and minicomputers); C6110 (Systems analysis and programming)", 21521 classification = "723", 21522 corpsource = "Bell Telephone Labs., Murray Hill, NJ, USA", 21523 journalabr = "Commun ACM", 21524 keywords = "computer operating systems; computer programming; dedicated; maintenance; Programmer's Workbench; programming; software development; special purpose computers; specialized computer", 21525 treatment = "P Practical", 21526} 21527 21528@Article{Smith:1977:MMO, 21529 author = "Alan Jay Smith", 21530 title = "Multiprocessor Memory Organization and Memory Interference", 21531 journal = j-CACM, 21532 volume = "20", 21533 number = "10", 21534 pages = "754--761", 21535 month = oct, 21536 year = "1977", 21537 CODEN = "CACMA2", 21538 ISSN = "0001-0782", 21539 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21540 bibsource = "Compendex database", 21541 abstract = "The structure of shared memory in a multiprocessor computer system is examined with particular attention to noninterleaved memory. Alternative memory organizations are compared and it is shown that a home memory organization, in which each processor is associated with one or more memories in which its address space concentrated, is quite effective in reducing memory interference. Home memory organization is shown to be particularly suited to certain specialized computational problems as well as to possess advantages in terms of interference and reliability for general purpose computation. Results for interleaved memory are drawn from previous work and are used for comparison. Trace-driven simulations are used to verify the conclusions of the analysis.", 21542 acknowledgement = ack-nhfb, 21543 classcodes = "C5220 (Computer architecture)", 21544 classification = "723", 21545 corpsource = "Univ. of California, Berkeley, CA, USA", 21546 journalabr = "Commun ACM", 21547 keywords = "computer system; computer systems programming; file organisation; memory interference; memory organization; multiprocessing systems; multiprocessor; noninterleaved memory; shared memory", 21548 treatment = "T Theoretical or Mathematical", 21549} 21550 21551@Article{Boyer:1977:FSS, 21552 author = "Robert S. Boyer and J. Strother Moore", 21553 title = "A Fast String Searching Algorithm", 21554 journal = j-CACM, 21555 volume = "20", 21556 number = "10", 21557 pages = "762--772", 21558 month = oct, 21559 year = "1977", 21560 CODEN = "CACMA2", 21561 ISSN = "0001-0782", 21562 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21563 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib", 21564 note = "See also \cite{Knuth:1977:FPM} and \cite{Sunday:1990:VFS}.", 21565 abstract = "An algorithm is presented that searches for the location, ``i,'' of the first occurrence of a character string, ``pat,'' in another string, ``string.'' During the search operation, the characters of pat are matched starting with the last character of pat. The information gained by starting the match at the end of the pattern often allows the algorithm to proceed in large jumps through the text being searched. Thus the algorithm has the unusual property that, in most cases, not all of the first i characters of string are inspected. The number of characters actually inspected (on the average) decreases as a function of the length of pat. For a random English pattern of length 5, the algorithm will typically inspect i/4 characters of string before finding a match at i. Furthermore, the algorithm has been implemented so that (on the average) fewer than i plus patlen machine instructions are executed. These conclusions are supported with empirical evidence and a theoretical analysis of the average behavior of the algorithm. The worst case behavior of the algorithm is linear in i plus patlen, assuming the availability of array space for tables linear in patlen plus the size of the alphabet.", 21566 acknowledgement = ack-nhfb, 21567 classcodes = "C4240 (Programming and algorithm theory); C6130 (Data handling techniques)", 21568 classification = "723; 901", 21569 comment = "The Boyer-Moore string matching algorithm is, in the worst case, linear in the length of the text + length of the pattern. The average case behavior is sublinear. Practical efficient implementations of this algorithm exist. By starting the comparisons at the right of the pattern instead of the left of the pattern, large jumps can be made in the text.", 21570 corpsource = "Stanford Res. Inst., Stanford, CA, USA", 21571 journalabr = "Commun ACM", 21572 keywords = "algorithm; Boyer-Moore; character string; computer operating systems; computer programming; fast; information science --- Information Retrieval; list processing; pattern matching; string matching; string searching; text; text editing", 21573 treatment = "T Theoretical or Mathematical", 21574} 21575 21576@Article{Lee:1977:CFP, 21577 author = "J. A. N. Lee", 21578 title = "Considerations for future programming language standards activities", 21579 journal = j-CACM, 21580 volume = "20", 21581 number = "11", 21582 pages = "788--794", 21583 month = nov, 21584 year = "1977", 21585 CODEN = "CACMA2", 21586 ISSN = "0001-0782", 21587 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21588 acknowledgement = ack-nhfb, 21589 classcodes = "C6140D (High level languages)", 21590 corpsource = "Dept. of Computer Sci., Virginia Polytech. Inst. and State Univ., Blacksburg, VA, USA", 21591 keywords = "BASIC; COBOL; documentation; error conditions; FORTRAN; future; PL/I; procedure oriented languages; programming language; standards", 21592 treatment = "G General Review; P Practical", 21593} 21594 21595@Article{Turner:1977:ULS, 21596 author = "Rollins Turner and Bill Strecker", 21597 title = "Use of the {LRU} Stack Depth Distribution for Simulation of Paging Behavior", 21598 journal = j-CACM, 21599 volume = "20", 21600 number = "11", 21601 pages = "795--798", 21602 month = nov, 21603 year = "1977", 21604 CODEN = "CACMA2", 21605 ISSN = "0001-0782", 21606 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21607 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/storage.bib", 21608 abstract = "Two families of probability distributions are needed for use by a virtual memory simulation model: headway between page fault distributions, and working set size distributions. All members of both families can be derived from the LRU stack depth distribution. Simple expressions for the computation of both kinds of distributions are given. Finally, examples are given of both families of distributions as computed from a published stack depth distribution.", 21609 acknowledgement = ack-nhfb, 21610 classcodes = "C6120 (File organisation)", 21611 classification = "723", 21612 corpsource = "Digital Equipment Corp., Maynard, MA, USA", 21613 journalabr = "Commun ACM", 21614 keywords = "computer operating systems; fault distributions; least; LRU; memory hierarchy; paging; Performance Evaluation: Experimental; probability; recently used; simulation; stack depth distribution; virtual memory; virtual storage", 21615 treatment = "T Theoretical or Mathematical", 21616} 21617 21618@Article{Crow:1977:APC, 21619 author = "Franklin C. Crow", 21620 title = "The Aliasing Problem in Computer-Generated Shaded Images", 21621 journal = j-CACM, 21622 volume = "20", 21623 number = "11", 21624 pages = "799--805", 21625 month = nov, 21626 year = "1977", 21627 CODEN = "CACMA2", 21628 ISSN = "0001-0782", 21629 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21630 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib", 21631 abstract = "Certain defects, such as jagged edges and disappearing detail, have long been an annoyance in digitally generated shaded images. Although increasing the resolution or defocusing the display can attenuate them, an understanding of these defects leads to more effective methods. This paper explains the observed defects in terms of the aliasing phenomenon inherent in sampled signals and discusses prefiltering as a recognized cure. A method for evaluating filters is presented, the application of prefiltering to hidden-surface algorithms is discussed, and an implementation of a filtering tiler is shown accompanied by examples of its effectiveness.", 21632 acknowledgement = ack-nhfb, 21633 annote = "Certain defects, such as jagged edges and disappearing detail, have long been an annoyance in digitally generated shaded images. Although increasing the resolution or defocusing the display can attenuate them, an understanding of these defects leads to more effective methods. This paper explains the observed defects in terms of the aliasing phenomenon inherent in sampled signals and discusses prefiltering as a recognized cure \ldots.", 21634 classcodes = "C6130B (Graphics techniques)", 21635 classification = "723", 21636 corpsource = "Univ. of Texas, Austin, TX, USA", 21637 descriptors = "Method; graphics; three-dimensional plot; display; filter theory; sampling; aliasing; convolutional filtering; hidden line algorithm", 21638 journalabr = "Commun ACM", 21639 keywords = "aliasing; antialiasing; CACM; computer graphics; defects; filtering tiler; prefiltering; sampled signals; shaded images", 21640 treatment = "P Practical", 21641} 21642 21643@Article{Lamport:1977:CRW, 21644 author = "Leslie Lamport", 21645 title = "Concurrent Reading and Writing", 21646 journal = j-CACM, 21647 volume = "20", 21648 number = "11", 21649 pages = "806--811", 21650 month = nov, 21651 year = "1977", 21652 CODEN = "CACMA2", 21653 ISSN = "0001-0782", 21654 MRclass = "68A05", 21655 MRnumber = "57 4572", 21656 mrreviewer = "Richard A. DeMillo", 21657 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21658 bibsource = "Compendex database", 21659 abstract = "The problem of sharing data among asynchronous processes is considered. It is assumed that only one process at a time can modify the data, but concurrent reading and writing is permitted. Two general theorems are proved, and some algorithms are presented to illustrate their use. These include a solution to the general problem in which a read is repeated if it might have obtained an incorrect result, and two techniques for transmitting messages between processes. These solutions do not assume any synchronizing mechanism other than data which can be written by one process and read by other processes.", 21660 acknowledgement = ack-nhfb, 21661 classcodes = "C6150J (Operating systems)", 21662 classification = "723", 21663 corpsource = "Massachusetts Computer Associates, Wakefield, MA, USA", 21664 journalabr = "Commun ACM", 21665 keywords = "algorithms; asynchronous processes; computer systems programming; concurrent; multiprocessing programs; reading; sharing data; theorems; writing", 21666 treatment = "T Theoretical or Mathematical", 21667} 21668 21669@Article{Shore:1977:ABF, 21670 author = "John E. Shore", 21671 title = "Anomalous Behavior of the Fifty-Percent Rule in Dynamic Memory Allocation", 21672 journal = j-CACM, 21673 volume = "20", 21674 number = "11", 21675 pages = "812--820", 21676 month = nov, 21677 year = "1977", 21678 CODEN = "CACMA2", 21679 ISSN = "0001-0782", 21680 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21681 bibsource = "Compendex database", 21682 abstract = "Simulation data are reported showing that, in dynamic memory allocation, the average free-to-allocated-block ratio can differ considerably and in both directions from the predictions of the 50 percent rule. A new derivation is given, and it is shown that previous derivations make an assumption that may be violated frequently. On the basis of the simulation data and the derivation, it is hypothesized that the anomalous behavior results from the combined effects of systematic placement and the statistics of the release process. Additional simulations support this hypothesis. Systematic placement, which refers to the natural convention of always allocating storage requests against the same end of the free block selected by the allocation strategy, tends to order blocks within contiguous groups, according to their allocation time. The degree of anomalous behavior depends on the extent to which allocated blocks are released in the order of their allocation. For non-Markovian release processes, the extent of the correlation between allocation order and release order varies approximately inversely with the coefficient of variation of the memory residence time distribution. The simulations show that allocation efficiency depends strongly on the residence time distribution; efficiency decreases as the distribution's coefficient of variation increases. Some practical implications are briefly discussed.", 21683 acknowledgement = ack-nhfb, 21684 classcodes = "C6120 (File organisation)", 21685 classification = "723", 21686 corpsource = "Naval Res. Lab., Washington, DC, USA", 21687 journalabr = "Commun ACM", 21688 keywords = "50 percent rule; anomalous behaviour; computer operating systems; dynamic memory allocation; release process; simulation; storage allocation; systematic placement", 21689 treatment = "T Theoretical or Mathematical", 21690} 21691 21692@Article{Stockman:1977:EHC, 21693 author = "G. C. Stockman and A. K. Agrawala", 21694 title = "Equivalence of {Hough} curve detection to template matching", 21695 journal = j-CACM, 21696 volume = "20", 21697 number = "11", 21698 pages = "820--822", 21699 month = nov, 21700 year = "1977", 21701 CODEN = "CACMA2", 21702 ISSN = "0001-0782", 21703 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21704 acknowledgement = ack-nhfb, 21705 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 21706 corpsource = "LNK Corp., Silver Spring, MD, USA", 21707 keywords = "Hough; Hough curve detection; pattern recognition; template matching; transformation", 21708 treatment = "T Theoretical or Mathematical", 21709} 21710 21711@Article{Wirth:1977:WCW, 21712 author = "N. Wirth", 21713 title = "What can we do about the unnecessary diversity of notation for syntactic definitions?", 21714 journal = j-CACM, 21715 volume = "20", 21716 number = "11", 21717 pages = "822--823", 21718 month = nov, 21719 year = "1977", 21720 CODEN = "CACMA2", 21721 ISSN = "0001-0782", 21722 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21723 acknowledgement = ack-nhfb, 21724 classcodes = "C4210 (Formal logic); C4240 (Programming and algorithm theory); C6140D (High level languages)", 21725 corpsource = "Federal Inst. of Technol., ETH, Zurich, Switzerland", 21726 keywords = "notation; programming languages; syntactic definitions", 21727 treatment = "T Theoretical or Mathematical", 21728} 21729 21730@Article{Roy:1977:NRP, 21731 author = "M. K. Roy", 21732 title = "A note on reflection-free permutation enumeration", 21733 journal = j-CACM, 21734 volume = "20", 21735 number = "11", 21736 pages = "823--823", 21737 month = nov, 21738 year = "1977", 21739 CODEN = "CACMA2", 21740 ISSN = "0001-0782", 21741 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21742 acknowledgement = ack-nhfb, 21743 classcodes = "C6110 (Systems analysis and programming)", 21744 corpsource = "Jadavpur Univ., Calcutta, India", 21745 keywords = "enumeration; permutation; programming; reflection free", 21746 treatment = "P Practical; T Theoretical or Mathematical", 21747} 21748 21749@Article{Manna:1977:OAR, 21750 author = "Zohar Manna and Adi Shamir", 21751 title = "The Optimal Approach to Recursive Programs", 21752 journal = j-CACM, 21753 volume = "20", 21754 number = "11", 21755 pages = "824--831", 21756 month = nov, 21757 year = "1977", 21758 CODEN = "CACMA2", 21759 ISSN = "0001-0782", 21760 MRclass = "68A05", 21761 MRnumber = "56 13748", 21762 mrreviewer = "Giorgio Levi", 21763 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21764 acknowledgement = ack-nhfb, 21765 classcodes = "C4240 (Programming and algorithm theory) 1 Years All Years in which items were published. 2 Type All Publication types. 3 Language All Find only items published in this language. In any year A hyphen or ALL - In a certain year The four-digit year 1923 In or after a certain year The year and a hyphen 1960- In or before a certain year A hyphen and a year -1955 In or between two years Both years and a hyphen 1960-1975 1 Years 1970-1979 Years in which items were published. 2 Type All Publication types. 3 Language All Find only items published in this language.", 21766 corpsource = "Weizmann Inst. of Sci., Rehovoth, Israel", 21767 keywords = "optimal approach; optimal fixedpoints; programming theory; recursive programs", 21768 treatment = "T Theoretical or Mathematical", 21769} 21770 21771@Article{Hammer:1977:VHL, 21772 author = "Michael Hammer and W. Gerry Howe and Vincent J. Kruskal and Irving Wladawsky", 21773 title = "Very High Level Programming Language for Data Processing Applications", 21774 journal = j-CACM, 21775 volume = "20", 21776 number = "11", 21777 pages = "832--840", 21778 month = nov, 21779 year = "1977", 21780 CODEN = "CACMA2", 21781 ISSN = "0001-0782", 21782 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21783 bibsource = "Compendex database", 21784 abstract = "The structure of a very high level language designed for use in business data processing applications is described. The language, Business Definition Language (BDL), has been subjected to a number of validation studies where it was used to code parts of existing systems. An implementation is currently under way, as is a modeling and customization effort using BDL as the underlying system language. This latter system will be used to tailor predesigned application systems to an individual's needs by means of his responses to a questionnaire.", 21785 acknowledgement = ack-nhfb, 21786 classcodes = "C6140D (High level languages); C7100 (Business and administration)", 21787 classification = "723", 21788 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 21789 journalabr = "Commun ACM", 21790 keywords = "administrative data processing; BDL; business; business definition; business forms; calculations; computer programming languages; data processing, business; language; organization; problem oriented languages; sublanguages; very high level programming language", 21791 treatment = "P Practical", 21792} 21793 21794@Article{Sprugnoli:1977:PHF, 21795 author = "Renzo Sprugnoli", 21796 title = "Perfect Hashing Functions: {A} Single Probe Retrieving Method for Static Sets", 21797 journal = j-CACM, 21798 volume = "20", 21799 number = "11", 21800 pages = "841--850", 21801 month = nov, 21802 year = "1977", 21803 CODEN = "CACMA2", 21804 ISSN = "0001-0782", 21805 MRclass = "68A50", 21806 MRnumber = "56 17255", 21807 mrreviewer = "Eberhard Ludde", 21808 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21809 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib", 21810 note = "This is the first discussion on perfect hashing; describes heuristics for constructing perfect hash functions.", 21811 abstract = "A refinement of hashing which allows retrieval of an item in a static table with a single probe is considered. Given a set I of identifiers, two methods are presented for building, in a mechanical way, perfect hashing functions, i.e. functions transforming the elements of I into unique addresses. The first method, the ``quotient reduction'' method, is shown to be complete in the sense that for every set I the smallest table in which the elements of I can be stored and from which they can be retrieved by using a perfect hashing function constructed by this method can be found. However, for nonuniformly distributed sets, this method can give rather sparse tables. The second method, the ``remainder reduction'' method, is not complete in the above sense, but it seems to give minimal (or almost minimal) tables for every kind of set. The two techniques are applicable directly to small sets. Some methods to extend these results to larger sets are also presented. A rough comparison with ordinary hashing is given which shows that this method can be used conveniently in several practical applications.", 21812 acknowledgement = ack-nhfb, 21813 classcodes = "C6120 (File organisation)", 21814 classification = "723", 21815 corpsource = "Istituto di Elaborazione della Informazione, CNR, Pisa, Italy", 21816 journalabr = "Commun ACM", 21817 keywords = "computer programming; file organisation; functions; perfect hashing; retrieving; single probe; static sets", 21818 treatment = "T Theoretical or Mathematical", 21819} 21820 21821@Article{Cocke:1977:ARO, 21822 author = "John Cocke and Ken Kennedy", 21823 title = "An Algorithm for Reduction of Operator Strength", 21824 journal = j-CACM, 21825 volume = "20", 21826 number = "11", 21827 pages = "850--856", 21828 month = nov, 21829 year = "1977", 21830 CODEN = "CACMA2", 21831 ISSN = "0001-0782", 21832 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21833 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib", 21834 abstract = "A simple algorithm which uses an indexed temporary table to perform reduction of operator strength in strongly connected regions is presented. Several extensions, including linear function test replacement, are discussed. These algorithms should fit well into an integrated package of local optimization algorithms.", 21835 acknowledgement = ack-nhfb, 21836 classcodes = "C6150C (Compilers, interpreters and other processors)", 21837 classification = "723", 21838 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 21839 journalabr = "Commun ACM", 21840 keywords = "algorithm; computer programming; indexed temporary; linear function test; local optimization; operator strength; program compilers; reduction; replacement; strongly connected regions; table", 21841 treatment = "P Practical; T Theoretical or Mathematical", 21842} 21843 21844@Article{Bird:1977:IPI, 21845 author = "R. S. Bird", 21846 title = "Improving Programs by the Introduction of Recursion", 21847 journal = j-CACM, 21848 volume = "20", 21849 number = "11", 21850 pages = "856--863", 21851 month = nov, 21852 year = "1977", 21853 CODEN = "CACMA2", 21854 ISSN = "0001-0782", 21855 MRclass = "68A05", 21856 MRnumber = "56 17179", 21857 mrreviewer = "V. Cazanescu", 21858 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21859 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib", 21860 abstract = "A new technique of program transformation, called ``recursion introduction,'' is described and applied to two algorithms which solve pattern matching problems. By using a recursion introduction, algorithms which manipulate a stack are first translated into recursive algorithms in which no stack operations occur. These algorithms are then subjected to a second transformation, a method of recursion elimination called ``tabulation,'' to produce programs with a very efficient running time. In particular, it is shown how the fast linear pattern matching algorithm of Knuth, Morris, and Pratt can be derived in a few steps from a simple nonlinear stack algorithm.", 21861 acknowledgement = ack-nhfb, 21862 classcodes = "C4240 (Programming and algorithm theory)", 21863 classification = "723", 21864 corpsource = "Univ. of Reading, Reading, UK", 21865 journalabr = "Commun ACM", 21866 keywords = "computer programming; functional program transformation optimization recursion elimination pattern matching computational induction; program transformation; programming theory; recursion introduction; stack", 21867 treatment = "T Theoretical or Mathematical", 21868} 21869 21870@Article{Nielsen:1977:DMA, 21871 author = "Norman R. Nielsen", 21872 title = "Dynamic Memory Allocation in Computer Simulation", 21873 journal = j-CACM, 21874 volume = "20", 21875 number = "11", 21876 pages = "864--873", 21877 month = nov, 21878 year = "1977", 21879 CODEN = "CACMA2", 21880 ISSN = "0001-0782", 21881 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21882 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 21883 abstract = "Investigation is made of the performance of 35 dynamic memory allocation algorithms when used to service simulation programs as represented by 18 test cases. Algorithm performance was measured in terms of processing time, memory usage, and external memory fragmentation. Algorithms maintaining separate free space lists for each size of memory block used tended to perform quite well compared with other algorithms. Simple algorithms operating on memory ordered lists (without any free list) performed surprisingly well. Algorithms employing power-of-two block sizes had favorable processing requirements but generally unfavorable memory usage. Algorithms employing LIFO, FIFO, or memory ordered free lists generally performed poorly compared with others.", 21884 acknowledgement = ack-nhfb, 21885 classcodes = "C6120 (File organisation)", 21886 classification = "723", 21887 corpsource = "Stanford Res. Inst., Menlo Park, CA, USA", 21888 journalabr = "Commun ACM", 21889 keywords = "algorithms; computer operating systems --- Storage Allocation; computer simulation; digital simulation; dynamic memory allocation; external memory; fragmentation; memory usage; performance; processing time; storage allocation", 21890 treatment = "P Practical; T Theoretical or Mathematical", 21891} 21892 21893@Article{Blasgen:1977:EMM, 21894 author = "Michael W. Blasgen and Richard G. Casey and Kapali P. Eswaran", 21895 title = "An Encoding Method for Multifield Sorting and Indexing", 21896 journal = j-CACM, 21897 volume = "20", 21898 number = "11", 21899 pages = "874--878", 21900 month = nov, 21901 year = "1977", 21902 CODEN = "CACMA2", 21903 ISSN = "0001-0782", 21904 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21905 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 21906 note = "Also published in/as: IBM, Res.R., RJ 1753, IBM San Jose, Res.Lab, Mar.1976.", 21907 abstract = "The efficient retrieval from a database of records that satisfy an expression involving more than one data field is examined. Sequences of character strings with an order relation imposed between sequences are considered. An encoding scheme is described which produces a single, order-preserving string from a sequence of strings. The original sequence can be recovered from the encoded string, and one sequence of strings precedes another if and only if the encoding of the first precedes the encoding of the second. The strings may be variable length, without a maximum length restriction, and no symbols need be reserved for control purposes. Hence any symbol may occur in any string. The scheme is useful for multifield sorting, multifield indexing, and other applications where ordering on more than one field is important.", 21908 acknowledgement = ack-nhfb, 21909 annote = "Coding for SYSTEM R multi-field indexes.", 21910 classcodes = "C6130 (Data handling techniques)", 21911 classification = "723", 21912 corpsource = "IBM Res. Lab., San Jose, CA, USA", 21913 journalabr = "Commun ACM", 21914 keywords = "character; codes, symbolic; encoding method; indexing; information science --- Information Retrieval; multifield sorting; order relation; sorting; strings", 21915 treatment = "P Practical; T Theoretical or Mathematical", 21916} 21917 21918@Article{Grapa:1977:STA, 21919 author = "Enrique Grapa and Geneva G. Belford", 21920 title = "Some Theorems to Aid in Solving the File Allocation Problem", 21921 journal = j-CACM, 21922 volume = "20", 21923 number = "11", 21924 pages = "878--882", 21925 month = nov, 21926 year = "1977", 21927 CODEN = "CACMA2", 21928 ISSN = "0001-0782", 21929 MRclass = "68A50", 21930 MRnumber = "57 4705", 21931 mrreviewer = "Witold Lipski", 21932 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21933 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 21934 acknowledgement = ack-nhfb, 21935 classcodes = "C0310 (EDP management); C5620 (Computer networks and techniques); C6120 (File organisation)", 21936 corpsource = "Univ. of Illinois, Urbana, IL, USA", 21937 keywords = "computer networks; copies; DP management; file allocation problem; network sites; storage allocation; theorems", 21938 treatment = "T Theoretical or Mathematical", 21939} 21940 21941@Article{Lopez:1977:SCS, 21942 author = "A. A. Lopez and R. Raymond and R. Tardiff", 21943 title = "A survey of computer science offerings in small liberal arts colleges", 21944 journal = j-CACM, 21945 volume = "20", 21946 number = "12", 21947 pages = "902--906", 21948 month = dec, 21949 year = "1977", 21950 CODEN = "CACMA2", 21951 ISSN = "0001-0782", 21952 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21953 acknowledgement = ack-nhfb, 21954 classcodes = "C0220 (Computing education and training)", 21955 corpsource = "Univ. of Minnosota, Morris, MN, USA", 21956 keywords = "computer science; computer science education; curricular; development; programming courses; small liberal arts colleges", 21957 treatment = "G General Review", 21958} 21959 21960@Article{Kessels:1977:CFN, 21961 author = "J. L. W. Kessels", 21962 title = "A Conceptual Framework for a Nonprocedural Programming Language", 21963 journal = j-CACM, 21964 volume = "20", 21965 number = "12", 21966 pages = "906--913", 21967 month = dec, 21968 year = "1977", 21969 CODEN = "CACMA2", 21970 ISSN = "0001-0782", 21971 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21972 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 21973 abstract = "A sequential programming language forces the programmer to prescribe explicitly the order in which the operations in his program have to be executed, even if the order is not relevant to the solution of his problem. The requirement to indicate irrelevant sequencing can be removed if the language provides facilities for specifying a task in a nonprocedural manner. In general, a program specified in this way will allow concurrent evaluation. A conceptual framework for a high level programming language is described providing both nonprocedural and sequential facilities. Within a program, nonprocedural and sequential program modules may be nested freely.", 21974 acknowledgement = ack-nhfb, 21975 classcodes = "C4240 (Programming and algorithm theory); C6140D (High level languages)", 21976 classification = "723", 21977 corpsource = "Philips Res. Labs., Eindhoven, Netherlands", 21978 journalabr = "Commun ACM", 21979 keywords = "computer programming languages; conceptual framework; concurrent; nonprocedural programming language; parallel; programming languages; sequential", 21980 treatment = "T Theoretical or Mathematical", 21981} 21982 21983@Article{Carter:1977:CSN, 21984 author = "J. Lawrence Carter", 21985 title = "A Case Study of a New Code Generation Technique for Compilers", 21986 journal = j-CACM, 21987 volume = "20", 21988 number = "12", 21989 pages = "914--920", 21990 month = dec, 21991 year = "1977", 21992 CODEN = "CACMA2", 21993 ISSN = "0001-0782", 21994 bibdate = "Tue Mar 25 13:26:09 MST 1997", 21995 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/compiler.bib and ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 21996 abstract = "Recent developments in optimizing techniques have allowed a new design for compilers to emerge. Such a compiler translates the parsed source code into lower level code by a sequence of steps. Each step expands higher level statements into blocks of lower level code and then performs optimizations on the result. Evidence is provided that this strategy can indeed result in good object code. The traditionally difficult PL/I concatenate statement was investigated as a detailed example.", 21997 acknowledgement = ack-nhfb, 21998 annote = "Describes a unified system which can handle both interpretation and compilation.", 21999 classcodes = "C6150C (Compilers, interpreters and other processors)", 22000 classification = "723", 22001 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 22002 journalabr = "Commun ACM", 22003 keywords = "case study; code generation technique; codes, symbolic; compilers; computer operating systems; program compilers", 22004 treatment = "T Theoretical or Mathematical", 22005} 22006 22007@Article{Gries:1977:EPP, 22008 author = "David Gries", 22009 title = "An Exercise in Proving Parallel Programs Correct", 22010 journal = j-CACM, 22011 volume = "20", 22012 number = "12", 22013 pages = "921--930", 22014 month = dec, 22015 year = "1977", 22016 CODEN = "CACMA2", 22017 ISSN = "0001-0782", 22018 MRclass = "68A05", 22019 MRnumber = "58 3615", 22020 mrreviewer = "Andrzej Blikle", 22021 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22022 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 22023 note = "See corrigendum \cite{Gries:1978:CEP}.", 22024 acknowledgement = ack-nhfb, 22025 classcodes = "C4240 (Programming and algorithm theory)", 22026 corpsource = "Cornell Univ., Ithaca, NY, USA", 22027 keywords = "correct; garbage collector; parallel processing; parallel programs; programming theory; proving; storage management", 22028 treatment = "T Theoretical or Mathematical", 22029} 22030 22031@Article{Grief:1977:LFP, 22032 author = "Irene Grief", 22033 title = "A language for formal problem specification", 22034 journal = j-CACM, 22035 volume = "20", 22036 number = "12", 22037 pages = "931--935", 22038 month = dec, 22039 year = "1977", 22040 CODEN = "CACMA2", 22041 ISSN = "0001-0782", 22042 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22043 bibsource = "Compendex database", 22044 abstract = "A language for specifying the intended behavior of communicating parallel processes is described. The specifications are constraints on the order in which events of a computation can occur. The language is used to write specifications of the readers\slash writers problem and the writer priority of the second readers\slash writers problem.", 22045 acknowledgement = ack-nhfb, 22046 classcodes = "C4210 (Formal logic); C4240 (Programming and algorithm theory)", 22047 classification = "723", 22048 corpsource = "Univ. of Washington, Seattle, WA, USA", 22049 journalabr = "Commun ACM", 22050 keywords = "communicating; computer programming languages; constraints; formal languages; formal problem specification; language; parallel processes; parallel processing; readers/writers problem; writer priority", 22051 treatment = "T Theoretical or Mathematical", 22052 xxauthor = "Irene Greif", 22053} 22054 22055@Article{Abrams:1977:MIC, 22056 author = "Marshall D. Abrams and Siegfried Treu", 22057 title = "A Methodology for Interactive Computer Service Measurement", 22058 journal = j-CACM, 22059 volume = "20", 22060 number = "12", 22061 pages = "936--944", 22062 month = dec, 22063 year = "1977", 22064 CODEN = "CACMA2", 22065 ISSN = "0001-0782", 22066 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22067 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1977.bib", 22068 abstract = "A measurement methodology applicable to in teractive computer service is described. Its primary purpose is to enable external, user-oriented assessment of computer performance, instead of the more frequently used in ternal system measurement techniques. \par The NBS Network Measurement System is employed as the external measurement tool. Example data have been collected and analyzed. A demonstration of the methodology, leading to a pragmatic figure-of-merit evaluation of results, is included.", 22069 acknowledgement = ack-nhfb, 22070 annote = "A measurement methodology applicable to interactive computer service is described. Its primary purpose is to enable external, user-oriented assessment of computer performance, instead of the more frequently used internal system measurement techniques. The NBS Network Measurement System is employed as the external measurement tool. Example data have been collected and analyzed. A demonstration of the methodology, leading to a pragmatic figure-of\ldots.", 22071 classcodes = "C6150G (Diagnostic, testing, debugging and evaluating systems)", 22072 classification = "722; 723", 22073 corpsource = "Nat. Bur. of Stand., Washington, DC, USA", 22074 country = "USA", 22075 descriptors = "Man-machine interaction; performance measure; measurement; method; survey;", 22076 enum = "5", 22077 journalabr = "Commun ACM", 22078 keywords = "computer selection and evaluation; computer service; computer systems, digital; external; external measurement; figure-of-merit.; in teractive system; interactive; interactive computer systems; measurement; measurement model; measures; methodology; network measurement system; performance", 22079 language = "English", 22080 references = "24", 22081 treatment = "T Theoretical or Mathematical", 22082} 22083 22084@Article{Danziger:1977:CIA, 22085 author = "J. N. Danziger and W. H. Dutton", 22086 title = "Computers as an innovation in {American} local governments", 22087 journal = j-CACM, 22088 volume = "20", 22089 number = "12", 22090 pages = "945--956", 22091 month = dec, 22092 year = "1977", 22093 CODEN = "CACMA2", 22094 ISSN = "0001-0782", 22095 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22096 acknowledgement = ack-nhfb, 22097 classcodes = "C0230 (Economic, social and political aspects of computing); C7130 (Public administration)", 22098 corpsource = "Univ. of California, Irvine, CA, USA", 22099 keywords = "American local governments; applications; computer technology; EDP; financial support; government data processing; innovation; social aspects of automation", 22100 treatment = "G General Review", 22101} 22102 22103@Article{Summers:1977:MLP, 22104 author = "P. D. Summers", 22105 title = "A Methodology for {LISP} Program Construction from Examples", 22106 journal = j-CACM, 22107 volume = "24", 22108 number = "1", 22109 pages = "161--175", 22110 month = jan, 22111 year = "1977", 22112 CODEN = "CACMA2", 22113 ISSN = "0001-0782", 22114 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Ai/lisp.bib", 22115 keywords = "LISP", 22116} 22117 22118@Article{Lavington:1978:MMA, 22119 author = "S. H. Lavington", 22120 title = "The {Manchester Mark I} and {Atlas}: a historical perspective", 22121 journal = j-CACM, 22122 volume = "21", 22123 number = "1", 22124 pages = "4--12", 22125 month = jan, 22126 year = "1978", 22127 CODEN = "CACMA2", 22128 ISSN = "0001-0782", 22129 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22130 acknowledgement = ack-nhfb, 22131 classcodes = "C5220 (Computer architecture); C6150J (Operating systems)", 22132 corpsource = "Univ. of Manchester, Manchester, UK", 22133 keywords = "(computers); address generation; computer architecture; computer software; operating systems; store management", 22134 treatment = "P Practical", 22135} 22136 22137@Article{Ibbett:1978:DMC, 22138 author = "R. N. Ibbett and P. C. Capon", 22139 title = "The development of the {MU5} computer system", 22140 journal = j-CACM, 22141 volume = "21", 22142 number = "1", 22143 pages = "13--24", 22144 month = jan, 22145 year = "1978", 22146 CODEN = "CACMA2", 22147 ISSN = "0001-0782", 22148 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22149 bibsource = "Compendex database", 22150 abstract = "Following a brief outline of the background of the MU5 project, the aims and ideas for MU5 are discussed. A description is then given of the instruction set, which includes a number of features conducive to the production of efficient compiled code from high-level language source programs. The design of the processor is then traced from the initial ideas for an associatively addressed ``name store'' to the final multistage pipeline structure involving a prediction mechanism for instruction prefetching and a function queue for array element accessing. An overall view of the complete MU5 complex is presented together with a brief indication of its performance.", 22151 acknowledgement = ack-nhfb, 22152 classcodes = "C5220 (Computer architecture); C5420 (Mainframes and minicomputers); C6150J (Operating systems)", 22153 classification = "722; 723", 22154 corpsource = "Univ. of Manchester, Manchester, UK", 22155 journalabr = "Commun ACM", 22156 keywords = "architecture; code; computer; computer architecture; computer systems, digital; function queue; instruction prefetching; instruction set; MU5; name store; operating systems (computers); pipeline processing; pipeline structure", 22157 treatment = "P Practical", 22158} 22159 22160@Article{Borgerson:1978:ESU, 22161 author = "B. R. Borgerson and M. L. Hanson and P. A. Hartley", 22162 title = "Evolution of the {Sperry Univac 1100 Series}: a History, Analysis, and Projection", 22163 journal = j-CACM, 22164 volume = "21", 22165 number = "1", 22166 pages = "25--43", 22167 month = jan, 22168 year = "1978", 22169 CODEN = "CACMA2", 22170 ISSN = "0001-0782", 22171 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22172 bibsource = "Compendex database", 22173 abstract = "The 1100 series systems are Sperry Univac's large-scale mainframe computer systems. Beginning with the 1107 in 1962, the 1100 series has progressed through a succession of eight compatible computer models to the latest system, the 1100\slash 80, introduced in 1977. The 1100 series hardware architecture is based on a 36-bit word, ones complement structure which obtains one operand from storage and one from a high-speed register, or two operands from high-speed registers. The 1100 Operating System is designed to support a symmetrical multiprocessor configuration simultaneously providing multiprogrammed batch, timesharing, and transaction environments.", 22174 acknowledgement = ack-nhfb, 22175 classcodes = "C5220 (Computer architecture); C5420 (Mainframes and minicomputers); C6150J (Operating systems)", 22176 classification = "722; 723", 22177 corpsource = "Sperry Univac, Blue Bell, PA, USA", 22178 journalabr = "Commun ACM", 22179 keywords = "computer architecture; computer systems, digital; hardware architecture; multiprocessing systems; operating; Sperry Univac 1100 series; symmetrical multiprocessor configuration; systems (computers)", 22180 treatment = "P Practical", 22181} 22182 22183@Article{Bell:1978:ED, 22184 author = "C. G. Bell and A. Kotok and T. N. Hastings and R. Hill", 22185 title = "The Evolution of the {DECsystem 10}", 22186 journal = j-CACM, 22187 volume = "21", 22188 number = "1", 22189 pages = "44--63", 22190 month = jan, 22191 year = "1978", 22192 CODEN = "CACMA2", 22193 ISSN = "0001-0782", 22194 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22195 bibsource = "Compendex database", 22196 abstract = "The DECsystem 10, also known as the PDP-10, evolved from the PDP-6 (circa 1963) over five generations of implementations to presently include systems covering a price range of five to one. The origin and evolution of the hardware, operating system, and languages are described in terms of technological change, user requirements, and user developments. The PDP-10's contributions to computing technology include: accelerating the transition from batch oriented to time sharing computing systems; transferring hardware technology within DEC (and elsewhere) to minicomputer design and manufacturing; supporting minicomputer hardware and software development; and serving as a model for single user and timeshared interactive minicomputer\slash microcomputer systems.", 22197 acknowledgement = ack-nhfb, 22198 classcodes = "C5220 (Computer architecture); C5420 (Mainframes and minicomputers); C6150J (Operating systems)", 22199 classification = "722; 723", 22200 corpsource = "Digital Equipment Corp., Maynard, MA, USA", 22201 journalabr = "Commun ACM", 22202 keywords = "architecture; computer; computer architecture; computer systems, digital; DECsystem 10; operating system; operating systems (computers); sharing systems; time sharing; time-", 22203 treatment = "P Practical", 22204} 22205 22206@Article{Russell:1978:CCS, 22207 author = "Richard M. Russell", 22208 title = "The {CRAY-1} Computer System", 22209 journal = j-CACM, 22210 volume = "21", 22211 number = "1", 22212 pages = "63--72", 22213 month = jan, 22214 year = "1978", 22215 CODEN = "CACMA2", 22216 ISSN = "0001-0782", 22217 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22218 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib", 22219 abstract = "This paper describes the CRAY-1, discusses the evolution of its architecture, and gives an account of some of the problems that were overcome during its manufacture. The CRAY-1 is the only computer to have been built to date that satisfies ERDA's Class VI requirement (a computer capable of processing from 20 to 60 million floating point operations per second) [1]. The CRAY-1's Fortran compiler (CFT) is designed to give the scientific user immediate access to the benefits of the CRAY-1's vector processing architecture. An optimizing compiler, CFT, ``vectorizes'' innermost DO loops. Compatible with the ANSI 1966 Fortran Standard and with many commonly supported Fortran extensions, CFT does not require any source program modifications or the use of additional nonstandard Fortran statements to achieve vectorization. \par Thus the user's investment of hundreds of man months of effort to develop Fortran programs for other contemporary computers is protected.", 22220 acknowledgement = ack-nhfb, 22221 annote = "The original paper describing the Cray-1. This paper is reproduced in Kuhn and Padua's (1981, IEEE) survey ``Tutorial on Parallel Processing.'' Also reproduced in ``Computer Structures: Principles and Examples'' by Daniel P. Siewiorek, C. Gordon Bell, and Allen Newell, McGraw-Hill, 1982, pp. 743-752. Reproduced in Dharma P. Agrawal's (ed.) ``Advanced Computer Architecture,'' IEEE, 1986, pp.15-24. Literature search yields: 00712248 E. I. Monthly No: EI7804023850 E. I. Yearly No: EI78014612 Title: Cray-1 Computer System. Author: Russell, Richard M. Corporate Source: Cray Res Inc, Minneapolis, Minn Source: Communications of the ACM v 21 n 1 Jan 1978 p 63--72 Publication Year: 1978 CODEN: CACMA2 ISSN: 0001-0782 Language: ENGLISH Journal Announcement: 7804 Abstract: The CRAY-1 is described, the evolution of its architecture is discussed, and an account is given of some of the problems that were overcome during its manufacture. The CRAY-1 is the only computer to have been built to date that satisfies ERDA's Class VI requirement (a computer capable of processing from 20 to 60 million floating point operations per second). The CRAY-1's Fortran compiler (CFT) is designed to give the scientific user immediate access to the benefits of the CRAY-1's vector processing architecture. An optimizing compiler, CFT, ``vectorizes'' innermost DO loops. Compatible with the ANSI 1966 Fortran Standard and with many commonly supported Fortran extensions, CFT does not require any source program modifications or the use of additional nonstandard Fortran statements to achieve vectorization. 6 refs. Descriptors: *COMPUTER ARCHITECTURE; COMPUTER SYSTEMS, DIGITAL Classification Codes: 722 (Computer Hardware); 723 (Computer Software) 72 (COMPUTERS \& DATA PROCESSING)", 22222 classcodes = "C5220 (Computer architecture); C5420 (Mainframes and minicomputers); C6150J (Operating systems)", 22223 classification = "722; 723", 22224 corpsource = "Cray Res. Inc., Minneapolis, MN, USA", 22225 journalabr = "Commun ACM", 22226 keywords = "architecture; CFT; computer architecture; computer systems; computer systems, digital; CRAY-1 computer system; existing classic architecture; ginsberg biblio: bhibbard enm; grecommended91; implementation; j\-lb; maeder biblio: parallel hardware and devices; operating systems (computers); processing; vector", 22227 treatment = "P Practical", 22228} 22229 22230@Article{Case:1978:AIS, 22231 author = "Richard P. Case and Andris Padegs", 22232 title = "Architecture of the {IBM System}\slash 370", 22233 journal = j-CACM, 22234 volume = "21", 22235 number = "1", 22236 pages = "73--96", 22237 month = jan, 22238 year = "1978", 22239 CODEN = "CACMA2", 22240 ISSN = "0001-0782", 22241 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22242 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/storage.bib", 22243 acknowledgement = ack-nhfb, 22244 classcodes = "C5220 (Computer architecture); C5420 (Mainframes and minicomputers); C6150J (Operating systems)", 22245 corpsource = "IBM Corp., White Plains, NY, USA", 22246 keywords = "Architectures; computer architecture; data manipulation; debugging; design considerations; error handling; input/output operations; instructions; memory hierarchy; monitoring; multiprocessing; operating systems (computers); program control; timing facilities; virtual storage", 22247 treatment = "P Practical", 22248} 22249 22250@Article{Mamrak:1978:CSF, 22251 author = "S. A. Mamrak and R. G. {Montanelli, Jr.}", 22252 title = "Computer science faculties: the current status of minorities and women", 22253 journal = j-CACM, 22254 volume = "21", 22255 number = "2", 22256 pages = "115--119", 22257 month = feb, 22258 year = "1978", 22259 CODEN = "CACMA2", 22260 ISSN = "0001-0782", 22261 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22262 acknowledgement = ack-nhfb, 22263 classcodes = "C0220 (Computing education and training)", 22264 corpsource = "Ohio State Univ., Columbus, OH, USA", 22265 keywords = "academic computer science; computer science education; discrimination; minorities; women", 22266 treatment = "G General Review", 22267} 22268 22269@Article{Rivest:1978:MOD, 22270 author = "R. L. Rivest and A. Shamir and L. Adelman", 22271 title = "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", 22272 journal = j-CACM, 22273 volume = "21", 22274 number = "2", 22275 pages = "120--126", 22276 month = feb, 22277 year = "1978", 22278 CODEN = "CACMA2", 22279 ISSN = "0001-0782", 22280 MRclass = "94A05", 22281 MRnumber = "83m:94003", 22282 mrreviewer = "J. L. Selfridge", 22283 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22284 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib and ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib", 22285 note = "The basics of trap-door functions and the famous RSA public key cryptosystem are presented in this paper.", 22286 abstract = "An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. (2) A message can be ``signed'' using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature.", 22287 acknowledgement = ack-nhfb, 22288 classcodes = "C6130 (Data handling techniques)", 22289 classification = "723", 22290 corpsource = "Dept. of Math., MIT, Cambridge, MA, USA", 22291 journalabr = "Commun ACM", 22292 keywords = "computer programming; cryptography; cryptosystems; data handling; data processing --- Security of Data; decryption key; digital signatures; encryption key; number theory; operating protection; RSA; security; security of data", 22293 treatment = "T Theoretical or Mathematical", 22294} 22295 22296@Article{Auslander:1978:SRR, 22297 author = "M. A. Auslander and H. R. Strong", 22298 title = "Systematic Recursion Removal", 22299 journal = j-CACM, 22300 volume = "21", 22301 number = "2", 22302 pages = "127--134", 22303 month = feb, 22304 year = "1978", 22305 CODEN = "CACMA2", 22306 ISSN = "0001-0782", 22307 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22308 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 22309 abstract = "The recursion removal algorithm presented by Strong and Walker is amplified and applied to a relatively complex PL/I program. The aim is to demonstrate systematic recursion-removal techniques on something more complex than Knuth's ``sturdy toddler'' and to obtain measurements of the cost of procedure linkage in PL/I and the savings achievable via procedure integration in the presence of recursion. First, the paper describes the recursion-removal process and the example on which it will be illustrated. Recursion removal is then applied to the two major parts of this example and the final result of the process is displayed. Our performance comparison results are presented and our conclusions are briefly discussed.", 22310 acknowledgement = ack-nhfb, 22311 classcodes = "C4240 (Programming and algorithm theory); C6140D (High level languages)", 22312 classification = "723", 22313 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 22314 journalabr = "Commun ACM", 22315 keywords = "computer programming; linkage; optimization; PL/1; procedure; procedure integration; procedure linkage; programming theory; recursion elimination; recursion removal; recursion removal algorithm", 22316 treatment = "A Application; T Theoretical or Mathematical", 22317} 22318 22319@Article{Kou:1978:CEC, 22320 author = "L. T. Kou and L. J. Stockmeyer and C. K. Wong", 22321 title = "Covering Edges by Cliques with Regard to Keyword Conflicts and Intersection Graphs", 22322 journal = j-CACM, 22323 volume = "21", 22324 number = "2", 22325 pages = "135--139", 22326 month = feb, 22327 year = "1978", 22328 CODEN = "CACMA2", 22329 ISSN = "0001-0782", 22330 MRclass = "68A20 (05C35)", 22331 MRnumber = "57 4620", 22332 mrreviewer = "A. T. Amin", 22333 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22334 bibsource = "Compendex database", 22335 abstract = "E. Kellerman has presented a method for determining keyword conflicts and described a heuristic algorithm which solves a certain combinatorial optimization problem in connection with this method. This optimization problem is shown to be equivalent to the problem of covering the edges of a graph by complete subgraphs with the objective of minimizing the number of complete subgraphs. A relationship between this edge-clique-cover problem and the graph coloring problem is established which allows algorithms for either one of these problems to be constructed from algorithms for the other.", 22336 acknowledgement = ack-nhfb, 22337 classcodes = "C1160 (Combinatorial mathematics); C1180 (Optimisation techniques); C4240 (Programming and algorithm theory)", 22338 classification = "723; 921", 22339 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 22340 journalabr = "Commun ACM", 22341 keywords = "clique cover problem; cliques; combinatorial optimization problem; computational complexity; computer programming; edge; graph colouring; intersection graphs; keyword conflicts; optimisation; optimization", 22342 treatment = "T Theoretical or Mathematical", 22343} 22344 22345@Article{Held:1978:BTR, 22346 author = "Gerald Held and Michael Stonebraker", 22347 title = "{B}-Trees Re-Examined", 22348 journal = j-CACM, 22349 volume = "21", 22350 number = "2", 22351 pages = "139--143", 22352 month = feb, 22353 year = "1978", 22354 CODEN = "CACMA2", 22355 ISSN = "0001-0782", 22356 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22357 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 22358 note = "Also published in/as: UCB, Elec. Res. Lab, No.ERL-M528, July 1975.", 22359 abstract = "The B-tree and its variants have, with increasing frequency, been proposed as a basic storage structure for multiuser database applications. Three potential problems which must be dealt with in such a structure that do not arise in more traditional static directory structures are indicated. One problem is a possible performance penalty.", 22360 acknowledgement = ack-nhfb, 22361 annote = "Static versus dynamic indexes.", 22362 classcodes = "C1160 (Combinatorial mathematics); C6120 (File organisation)", 22363 classification = "723", 22364 corpsource = "Tandem Computers Inc., Capertino, CA, USA", 22365 journalabr = "Commun ACM", 22366 keywords = "data base systems; Ingres ISAM CACM", 22367 keywords = "(mathematics); B-tree; data structures; database; database management systems; directory structures; storage structure; trees", 22368 treatment = "G General Review; T Theoretical or Mathematical", 22369} 22370 22371@Article{Stewart:1978:CNT, 22372 author = "William J. Stewart", 22373 title = "A Comparison of Numerical Techniques in {Markov} Modeling", 22374 journal = j-CACM, 22375 volume = "21", 22376 number = "2", 22377 pages = "144--152", 22378 month = feb, 22379 year = "1978", 22380 CODEN = "CACMA2", 22381 ISSN = "0001-0782", 22382 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22383 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib", 22384 abstract = "Presentation of several numerical methods which may be used to obtain the stationary probability vectors of Markovian models. An example of a nearly decomposable system is considered, and the results obtained by the different methods examined. A post mortem reveals why standard techniques often fail to yield the correct results. Finally, a means of estimating the error inherent in the decomposition of certain models is presented.", 22385 acknowledgement = ack-nhfb, 22386 classcodes = "C1140Z (Other topics in statistics); C1220 (Simulation, modelling and identification); C4110 (Error analysis in numerical methods)", 22387 classification = "912", 22388 corpsource = "Univ. de Rennes, Rennes, France", 22389 country = "USA", 22390 descriptors = "Markov chain; linear equation;", 22391 enum = "7926", 22392 journalabr = "Commun ACM", 22393 keywords = "decomposable system; error analysis; management science; Markov processes; Markovian; methods; modelling; models; numerical; numerical methods; operations research; stationary probability vectors", 22394 language = "English", 22395 references = "0", 22396 treatment = "T Theoretical or Mathematical", 22397} 22398 22399@Article{Herman:1978:RMI, 22400 author = "Gabor T. Herman and Arnold Lent and Peter H. Lutz", 22401 title = "Relaxation Methods for Image Reconstruction", 22402 journal = j-CACM, 22403 volume = "21", 22404 number = "2", 22405 pages = "152--158", 22406 month = feb, 22407 year = "1978", 22408 CODEN = "CACMA2", 22409 ISSN = "0001-0782", 22410 MRclass = "68A45 (92A05)", 22411 MRnumber = "58 19419", 22412 mrreviewer = "J. J. Buckley", 22413 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22414 bibsource = "Compendex database", 22415 abstract = "It is shown that, for a consistent system of linear inequalities, any sequence of relaxation parameters lying strictly between 0 and 2 generates a sequence of vectors which converges to a solution. Under the same assumptions, for a system of linear equations, the relaxation method converges to the minimum norm solution. Previously proposed techniques are shown to be special cases of our procedure with different choices of relaxation parameters. The practical consequences for image reconstruction of the choice of the relaxation parameters are discussed. This work is applicable to biomedical engineering and mathematical programming.", 22416 acknowledgement = ack-nhfb, 22417 classcodes = "C1180 (Optimisation techniques); C1260 (Information theory); C4140 (Linear algebra)", 22418 classification = "461; 723; 921", 22419 corpsource = "State Univ. of New York, Buffalo, NY, USA", 22420 journalabr = "Commun ACM", 22421 keywords = "biomedical engineering; convergence of numerical methods; greyness integrals; image processing; image reconstruction; linear inequalities; mathematical programming; method; picture processing; relaxation", 22422 treatment = "T Theoretical or Mathematical", 22423} 22424 22425@Article{Manna:1978:SSB, 22426 author = "Zohar Manna and Richard Waldinger", 22427 title = "Is `Sometime' Sometimes Better Than `Always'? (Intermittent Assertions in Proving Program Correctness)", 22428 journal = j-CACM, 22429 volume = "21", 22430 number = "2", 22431 pages = "159--172", 22432 month = feb, 22433 year = "1978", 22434 CODEN = "CACMA2", 22435 ISSN = "0001-0782", 22436 MRclass = "68A05", 22437 MRnumber = "58 3630", 22438 mrreviewer = "Franco Sirovich", 22439 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22440 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 22441 abstract = "This paper explores a technique for proving the correctness and termination of programs simultaneously. \par This approach, the intermittent-assertion method, involves documenting the program with assertions that must be true at some time when control passes through the corresponding point, but that need not be true every time. The method, introduced by Burstall, promises to provide a valuable complement to the more conventional methods. The intermittent-assertion method is presented with a number of examples of correctness and termination proofs. Some of these proofs are markedly simpler than their conventional counterparts. \par On the other hand, it is shown that a proof of correctness or termination by any of the conventional techniques can be rephrased directly as a proof using intermittent assertions. Finally, it is shown how the intermittent-assertion method can be applied to prove the validity of program transformations and the correctness of continuously operating programs.", 22442 acknowledgement = ack-nhfb, 22443 classcodes = "C4240 (Programming and algorithm theory)", 22444 classification = "723", 22445 corpsource = "Stanford Univ., Stanford, CA, USA", 22446 journalabr = "Commun ACM", 22447 keywords = "computer programming languages; continuously operating programs.; correctness of programs; intermittent assertions; program transformation; program verification; termination of programs", 22448 keywords = "assertions; continuously operating programs; intermittent-assertion method; program; program correctness; programming theory; termination proofs; transformations", 22449 treatment = "T Theoretical or Mathematical", 22450} 22451 22452@Article{Schachter:1978:SNM, 22453 author = "Bruce J. Schachter and Azriel Rosenfeld", 22454 title = "Some New Methods of Detecting Step Edges in Digital Pictures", 22455 journal = j-CACM, 22456 volume = "21", 22457 number = "2", 22458 pages = "172--176", 22459 month = feb, 22460 year = "1978", 22461 CODEN = "CACMA2", 22462 ISSN = "0001-0782", 22463 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22464 bibsource = "Compendex database", 22465 abstract = "Description of two operators that respond to step edges, but not to ramps. The first is similar to the digital Laplacian, but uses the max, rather than the sum, of the x and y second differences. The second uses the difference between the mean and median gray levels in a neighborhood. The outputs obtained from these operators applied to a set of test pictures are compared with each other and with the standard digital Laplacian and gradient. A third operator, which uses the distance between the center and centroid of a neighborhood as an edge value, is also briefly considered; it turns out to be equivalent to one of the standard digital approximations to the gradient.", 22466 acknowledgement = ack-nhfb, 22467 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition); C1260 (Information theory); C6130B (Graphics techniques)", 22468 classification = "723", 22469 corpsource = "Univ. of Maryland, College Park, MD, USA", 22470 journalabr = "Commun ACM", 22471 keywords = "computer graphics; digital; digital pictures; edge detection; gray levels; image processing; Laplacian; pattern recognition; picture processing; step edges", 22472 treatment = "A Application; T Theoretical or Mathematical", 22473} 22474 22475@Article{Rabin:1978:CCC, 22476 author = "Michael O. Rabin", 22477 title = "Corrigendum: {``Complexity of computations''}", 22478 journal = j-CACM, 22479 volume = "21", 22480 number = "3", 22481 month = mar, 22482 year = "1978", 22483 CODEN = "CACMA2", 22484 ISSN = "0001-0782", 22485 MRclass = "231.68A20", 22486 MRnumber = "57 8156", 22487 bibdate = "Tue Dec 26 13:35:07 1995", 22488 note = "See \cite{Rabin:1977:CC}.", 22489 acknowledgement = ack-nhfb, 22490} 22491 22492@Article{Lucas:1978:UII, 22493 author = "Henry C. {Lucas, Jr.}", 22494 title = "Use of an Interactive Information Storage and Retrieval System in Medical Research", 22495 journal = j-CACM, 22496 volume = "21", 22497 number = "3", 22498 pages = "197--205", 22499 month = mar, 22500 year = "1978", 22501 CODEN = "CACMA2", 22502 ISSN = "0001-0782", 22503 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22504 bibsource = "Compendex database", 22505 abstract = "Results of a study of the use of an interactive computerized storage and retrieval system. A monitor built into the computer system provided usage data for the study. Additional data on user reactions were gathered from a questionnaire. The results show the important role played by frequently chosen laboratory reference leaders in influencing the use of this system. The implications of the study for the design of similar systems are discussed.", 22506 acknowledgement = ack-nhfb, 22507 classcodes = "C7220 (Generation, dissemination, and use of information); C7250 (Information storage and retrieval); C7330 (Biology and medical computing)", 22508 classification = "723; 901", 22509 corpsource = "New York Univ., New York, NY, USA", 22510 journalabr = "Commun ACM", 22511 keywords = "computing; information retrieval system; information retrieval systems; information storage; information use; interactive; laboratory reference leaders; medical; medical research; monitor; use; user reactions", 22512 treatment = "A Application; P Practical", 22513} 22514 22515@Article{Dutton:1978:MUC, 22516 author = "William H. Dutton and Kenneth L. Kraemer", 22517 title = "Management Utilization of Computers in {American} Local Governments", 22518 journal = j-CACM, 22519 volume = "21", 22520 number = "3", 22521 pages = "206--218", 22522 month = mar, 22523 year = "1978", 22524 CODEN = "CACMA2", 22525 ISSN = "0001-0782", 22526 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22527 bibsource = "Compendex database", 22528 abstract = "Traditional concepts of management information systems (MIS) bear little relation to the information systems currently in use by top management in most US local governments. What exists is management-oriented computing, involving the use of relatively unsophisticated applications. Despite the unsophisticated nature of these systems, management use of computing is surprisingly common, but also varied in its extent among local governments. Management computing is most prevalent in those governments with professional management practices where top management is supportive of computing and tends to control computing decisions and where department users have less control over design and implementation activities. Finally, management computing clearly has impacts for top managers, mostly involving improvements in decision information.", 22529 acknowledgement = ack-nhfb, 22530 classcodes = "C0230 (Economic, social and political aspects of computing); C7130 (Public administration)", 22531 classification = "723; 901; 912; 922", 22532 corpsource = "Public Policy Res. Organization, Univ. of California, Irvine, CA, USA", 22533 journalabr = "Commun ACM", 22534 keywords = "concepts; decision information; decision theory and analysis; government data processing; information retrieval systems; local governments; management information systems; management practices; management science; management use of computing; professional; social aspects of automation; top management; US", 22535 treatment = "G General Review; P Practical", 22536} 22537 22538@Article{Anderson:1978:VOC, 22539 author = "R. E. Anderson", 22540 title = "Value orientation of computer science students", 22541 journal = j-CACM, 22542 volume = "21", 22543 number = "3", 22544 pages = "219--225", 22545 month = mar, 22546 year = "1978", 22547 CODEN = "CACMA2", 22548 ISSN = "0001-0782", 22549 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22550 acknowledgement = ack-nhfb, 22551 classcodes = "C0220 (Computing education and training); C0230 (Economic, social and political aspects of computing)", 22552 corpsource = "Univ. of Minnesota, Minneapolis, MN, USA", 22553 keywords = "computer science education; computer science students; social aspects of automation; social science; students; value structures", 22554 treatment = "G General Review", 22555} 22556 22557@Article{Kosaraju:1978:IDO, 22558 author = "S. Rao Kosaraju", 22559 title = "Insertions and Deletions in One-Sided Height-Balanced Trees", 22560 journal = j-CACM, 22561 volume = "21", 22562 number = "3", 22563 pages = "226--227", 22564 month = mar, 22565 year = "1978", 22566 CODEN = "CACMA2", 22567 ISSN = "0001-0782", 22568 MRclass = "68A10", 22569 MRnumber = "57 18210", 22570 mrreviewer = "Fabrizio Luccio", 22571 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22572 bibsource = "Compendex database", 22573 abstract = "D. S. Hischberg has established that insertions into one-sided height-balanced trees can be done in O(log**2N) steps. It is proved that deletions can also be performed in O(log**2N) steps, which answers the open problem posed by D. S. Hirschberg.", 22574 acknowledgement = ack-nhfb, 22575 classcodes = "C4240 (Programming and algorithm theory); C6110 (Systems analysis and programming)", 22576 classification = "723", 22577 corpsource = "Johns Hopkins Univ., Baltimore, MD, USA", 22578 journalabr = "Commun ACM", 22579 keywords = "AVL trees; balanced trees; binary search; computer programming; dynamic balancing", 22580 keywords = "deletions; insertions; one sided height balanced trees; programming theory; trees (mathematics)", 22581 treatment = "T Theoretical or Mathematical", 22582} 22583 22584@Article{DeMillo:1978:PAP, 22585 author = "Richard A. DeMillo and Stanley C. Eisenstat and Richard J. Lipton", 22586 title = "Preserving Average Proximity in Arrays", 22587 journal = j-CACM, 22588 volume = "21", 22589 number = "3", 22590 pages = "228--231", 22591 month = mar, 22592 year = "1978", 22593 CODEN = "CACMA2", 22594 ISSN = "0001-0782", 22595 MRclass = "68A50", 22596 MRnumber = "57 8217", 22597 mrreviewer = "Dorothy Bollman", 22598 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22599 bibsource = "Compendex database", 22600 abstract = "Programmers and data structure designers are often forced to choose between alternative structures. \par In storing these structures, preserving logical adjacencies or ``proximity'' is usually an important consideration. \par The combinatorial problem of storing arrays as various kinds of list structures is examined. Embeddings of graphs are used to model the loss of proximity involved in such storage schemes, and an elementary proof that arrays cannot be stored as linear lists with bounded loss of proximity is presented. Average loss of proximity is then considered, and it is shown that arrays cannot be stored as linear lists with only bounded loss of average proximity, but can be so stored in binary trees. The former result implies, for instance, that row major order is an asymptotically optimal storage strategy for arrays.", 22601 acknowledgement = ack-nhfb, 22602 classcodes = "C6120 (File organisation)", 22603 classification = "723", 22604 corpsource = "Georgia Inst. of Technol., Atlanta, GA, USA", 22605 journalabr = "Commun ACM", 22606 keywords = "arrays; average proximity; computer programming; data processing; data structure; data structures; graph embedding; linear lists; list structures; logical adjacencies; preserving; proximity; trees", 22607 treatment = "T Theoretical or Mathematical", 22608} 22609 22610@Article{Franklin:1978:AVP, 22611 author = "M. A. Franklin and G. Scott Graham and R. K. Gupta", 22612 title = "Anomalies with Variable Partition Paging Algorithms", 22613 journal = j-CACM, 22614 volume = "21", 22615 number = "3", 22616 pages = "232--236", 22617 month = mar, 22618 year = "1978", 22619 CODEN = "CACMA2", 22620 ISSN = "0001-0782", 22621 MRclass = "68A50", 22622 MRnumber = "57 14659", 22623 mrreviewer = "Johnson M. Hart", 22624 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22625 bibsource = "Compendex database", 22626 abstract = "Five types of anomalous behavior which may occur in paged virtual memory operating systems are defined. One type of anomaly, for example, concerns the fact that, with certain reference strings and paging algorithms, an increase in mean memory allocation may result in an increase in fault rate. Two paging algorithms, the page fault frequency and working set algorithms, are examined in terms of their anomaly potential, and reference string examples of various anomalies are presented. Two paging algorithm properties, the inclusion property and the generalized inclusion property, are discussed and the anomaly implications of these properties presented.", 22627 acknowledgement = ack-nhfb, 22628 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 22629 classification = "723", 22630 corpsource = "Washington Univ., St. Louis, MO, USA", 22631 journalabr = "Commun ACM", 22632 keywords = "anomalous behaviour; computer operating systems; computer programming --- Subroutines; operating systems (computers); page fault frequency; variable partition paging algorithms; virtual memory operating systems; virtual storage; working set algorithms", 22633 treatment = "T Theoretical or Mathematical", 22634} 22635 22636@Article{Tanenbaum:1978:ISP, 22637 author = "Andrew S. Tanenbaum", 22638 title = "Implications of Structured Programming for Machine Architecture", 22639 journal = j-CACM, 22640 volume = "21", 22641 number = "3", 22642 pages = "237--246", 22643 month = mar, 22644 year = "1978", 22645 CODEN = "CACMA2", 22646 ISSN = "0001-0782", 22647 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22648 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/risc.bib", 22649 abstract = "Based on an empirical study of more than 10,000 lines of program text written in a GOTO-less language, a machine architecture specifically designed for structured programs is proposed. Since assignment, CALL, RETURN, and IF statements together account for 93 percent of all executable statements, special care is given to ensure that these statements can be implemented efficiently. A highly compact instruction encoding scheme is presented, which can reduce program size by a factor of 3. Unlike a Huffman code, which utilizes variable length fields, this method uses only fixed length (1-byte) op code and address fields. The most frequent instructions consist of a single 1-byte field. As a consequence, instruction decoding time is minimized, and the machine is efficient with respect to both space and time.", 22650 acknowledgement = ack-nhfb, 22651 classcodes = "C5220 (Computer architecture); C6110 (Systems analysis and programming)", 22652 classification = "723", 22653 corpsource = "Vrije Univ., Amsterdam, Netherlands", 22654 journalabr = "Commun ACM", 22655 keywords = "computer architecture; computer operating systems; computer organization; instruction set design; machine architecture; MIPS RISC reduced restricted instruction set computer architecture pipelining microcoding; program characteristics; structured programming", 22656 treatment = "P Practical", 22657} 22658 22659@Article{Payne:1978:OEN, 22660 author = "W. H. Payne and K. L. McMillen", 22661 title = "Orderly Enumeration of Nonsingular Binary Matrices Applied to Text Encryption", 22662 journal = j-CACM, 22663 volume = "21", 22664 number = "4", 22665 pages = "259--263", 22666 month = apr, 22667 year = "1978", 22668 CODEN = "CACMA2", 22669 ISSN = "0001-0782", 22670 MRclass = "68C05", 22671 MRnumber = "80h:68031", 22672 mrreviewer = "P. E. O'Neil", 22673 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22674 bibsource = "Compendex database", 22675 abstract = "Nonsingular binary matrices of order N, i.e., nonsingular over the field left brace 0,1 right brace, and an initial segment of the natural numbers are placed in one-to-one correspondence. Each natural number corresponds to two intermediate vectors. These vectors are mapped into a nonsingular binary matrix. Examples of complete enumeration of all 2 multiplied by 2 and 3 multiplied by 3 nonsingular binary matrices were produced by mapping the intermediate vectors to the matrices. The mapping has application to the Vernam encipherment method using pseudorandom number sequences. A bit string formed from bytes of text of a data encryption key can be used as a representation of a natural number. This natural number is transformed to a nonsingular binary matrix. Key leverage is obtained by using the matrix as a ``seed'' in a shift register sequence pseudorandom number generator.", 22676 acknowledgement = ack-nhfb, 22677 classcodes = "C4140 (Linear algebra); C6130 (Data handling techniques)", 22678 classification = "723", 22679 corpsource = "Washington State Univ., Pullman, WA, USA", 22680 journalabr = "Commun ACM", 22681 keywords = "binary sequences; bit string; computer programming; data encryption key; encoding; enumeration; mapped; matrix algebra; natural number; nonsingular binary matrices; pseudorandom number; sequences; text editing; text encryption; Vernam encipherment method", 22682 treatment = "A Application; T Theoretical or Mathematical", 22683} 22684 22685@Article{Heckel:1978:TID, 22686 author = "Paul Heckel", 22687 title = "A Technique for Isolating Differences Between Files", 22688 journal = j-CACM, 22689 volume = "21", 22690 number = "4", 22691 pages = "264--268", 22692 month = apr, 22693 year = "1978", 22694 CODEN = "CACMA2", 22695 ISSN = "0001-0782", 22696 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22697 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/scm.bib", 22698 abstract = "A simple algorithm is described for isolating the differences between two files. One application is the comparing of two versions of a source program or other file in order to display all differences. The algorithm isolates differences in a way that corresponds closely to our intuitive notion of difference, is easy to implement, and is computationally efficient, with time linear in the file length. For most applications the algorithm isolates differences similar to those isolated by the longest common subsequence. Another application of this algorithm merges files containing independently generated changes into a single file. The algorithm can also be used to generate efficient encodings of a file in the form of the differences between itself and a given ``datum'' file, permitting reconstruction of the original file from the difference and datum files.", 22699 acknowledgement = ack-nhfb, 22700 classcodes = "C6120 (File organisation)", 22701 classification = "723", 22702 corpsource = "Interactive Systems Consultants, Palo Alto, CA, USA", 22703 journalabr = "Commun ACM", 22704 keywords = "computer programming; delta storage; encodings; file organisation; files; independently generated changes; isolating differences; longest common; merges; source program; subsequence; text editing", 22705 treatment = "T Theoretical or Mathematical", 22706} 22707 22708@Article{Lew:1978:OCE, 22709 author = "Art Lew", 22710 title = "Optimal Conversion of Extended-Entry Decision Tables with General Cost Criteria", 22711 journal = j-CACM, 22712 volume = "21", 22713 number = "4", 22714 pages = "269--279", 22715 month = apr, 22716 year = "1978", 22717 CODEN = "CACMA2", 22718 ISSN = "0001-0782", 22719 MRclass = "68C05 (49C20)", 22720 MRnumber = "80a:68032", 22721 mrreviewer = "C. L. Liu", 22722 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22723 bibsource = "Compendex database", 22724 abstract = "A general dynamic programming algorithm for converting limited extended, or mixed entry decision tables to optimal decision trees is presented which can take into account rule frequencies or probabilities, minimum time and\slash or space cost criteria, common action sets, compressed rules and ELSE rules, sequencing constraints on condition tests, excludable combinations of conditions, certain ambiguities, and interrupted rule masking.", 22725 acknowledgement = ack-nhfb, 22726 classcodes = "C6110 (Systems analysis and programming)", 22727 classification = "723", 22728 corpsource = "Univ. of Hawaii, Honolulu, HI, USA", 22729 journalabr = "Commun ACM", 22730 keywords = "common action sets; compressed; computer programming; condition tests; conversion; decision tables; ELSE rules; entry decision tables; extended entry decision tables; frequencies; general cost criteria; interrupted rule masking; minimum time; mixed; optimal decision trees; rule; rules; sequencing constraints", 22731 treatment = "T Theoretical or Mathematical", 22732} 22733 22734@Article{Baker:1978:LPR, 22735 author = "Henry G. {Baker, Jr.}", 22736 title = "List Processing in Real Time on a Serial Computer", 22737 journal = j-CACM, 22738 volume = "21", 22739 number = "4", 22740 pages = "280--294", 22741 month = apr, 22742 year = "1978", 22743 CODEN = "CACMA2", 22744 ISSN = "0001-0782", 22745 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22746 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 22747 note = "Originally appeared as MIT Artificial Intelligence Laboratory Working Paper No. 39, February 1977", 22748 abstract = "A real-time list processing system is one in which the time required by the elementary list operations (e.g. CONS CAR, CDR, RPLACA, RPLACD, EQ, and ATOM in LISP) is bounded by a (small) constant. Classical implementations of list processing systems lack this property because allocating a list cell from the heap may cause a garbage collection, which process requires time proportional to the heap size to finish. A real-time list processing system is presented which continuously reclaims garbage, including directed cycles, while linearizing and compacting the accessible cells into contiguous locations to avoid fragmenting the free storage pool.", 22749 acknowledgement = ack-nhfb, 22750 classcodes = "C6120 (File organisation); C6130 (Data handling techniques)", 22751 classification = "723", 22752 corpsource = "MIT, Cambridge, MA, USA", 22753 journalabr = "Commun ACM", 22754 keywords = "collection; computer programming; data processing; garbage; list processing; list processing system; real time; serial computer; storage management", 22755 treatment = "T Theoretical or Mathematical", 22756} 22757 22758@Article{Merkle:1978:SCI, 22759 author = "Ralph C. Merkle", 22760 title = "Secure Communications Over Insecure Channels", 22761 journal = j-CACM, 22762 volume = "21", 22763 number = "4", 22764 pages = "294--299", 22765 month = apr, 22766 year = "1978", 22767 CODEN = "CACMA2", 22768 ISSN = "0001-0782", 22769 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22770 bibsource = "Compendex database", 22771 abstract = "According to traditional conceptions of cryptographic security, it is necessary to transmit a key, by secret means, before encrypted messages can be sent securely. This paper shows that it is possible to select a key over open communications channels in such a fashion that communications security can be maintained. A method is described which forces any enemy to expend an amount of work which increases as the square of the work required of the two communicants to select the key. The method provides a logically new kind of protection against the passive eaves dropper. It suggests that further research on this topic will be highly rewarding, both in a theoretical and a practical sense.", 22772 acknowledgement = ack-nhfb, 22773 classcodes = "C5600 (Data communication equipment and techniques); C6130 (Data handling techniques)", 22774 classification = "723", 22775 corpsource = "Dept. of Electrical Engng. and Computer Sci., Univ. of California, Berkeley, CA, USA", 22776 journalabr = "Commun ACM", 22777 keywords = "communications channels; communications security; computer network security; cryptographic security; cryptography; cryptology; data communication systems; data processing; insecure channels; key distribution; open; passive eavesdropper; passive eavesdropping; protection; public key cryptosystem; Security; security of data; wiretap", 22778 treatment = "T Theoretical or Mathematical", 22779} 22780 22781@Article{Szymanski:1978:ACM, 22782 author = "Thomas G. Szymanski", 22783 title = "Assembling Code for machines with Span-Dependent Instructions", 22784 journal = j-CACM, 22785 volume = "21", 22786 number = "4", 22787 pages = "300--308", 22788 month = apr, 22789 year = "1978", 22790 CODEN = "CACMA2", 22791 ISSN = "0001-0782", 22792 MRclass = "68B05 (68C05)", 22793 MRnumber = "82g:68015", 22794 mrreviewer = "R. K. Shyamasundar", 22795 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22796 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Compiler.Lins.bib", 22797 acknowledgement = ack-nhfb, 22798 classcodes = "C4240 (Programming and algorithm theory); C6150C (Compilers, interpreters and other processors)", 22799 corpsource = "Princeton Univ., Princeton, NJ, USA", 22800 keywords = "code assembling; computational complexity; instructions; lengths of programs; program assemblers; programming; span dependent; theory", 22801 treatment = "T Theoretical or Mathematical", 22802} 22803 22804@Article{Vuillemin:1978:DSM, 22805 author = "Jean Vuillemin", 22806 title = "A Data Structure for Manipulating Priority Queues", 22807 journal = j-CACM, 22808 volume = "21", 22809 number = "4", 22810 pages = "309--315", 22811 month = apr, 22812 year = "1978", 22813 CODEN = "CACMA2", 22814 ISSN = "0001-0782", 22815 MRclass = "68A10", 22816 MRnumber = "57 18215", 22817 mrreviewer = "Bernard H. Rosman", 22818 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22819 bibsource = "Compendex database", 22820 abstract = "A data structure is described which can be used for representing a collection of priority queues. The primitive operations are insertion, deletion, union, update, and search for an item of earliest priority.", 22821 acknowledgement = ack-nhfb, 22822 classcodes = "C6120 (File organisation)", 22823 classification = "723", 22824 corpsource = "Univ. de Paris-Sud, Orsay, France", 22825 journalabr = "Commun ACM", 22826 keywords = "computer programming; data structure; data structures; deletion; earliest priority; insertion; manipulating priority queues; operations; primitive; search; union; update", 22827 treatment = "T Theoretical or Mathematical", 22828} 22829 22830@Article{Even:1978:EEC, 22831 author = "S. Even and M. Rodeh", 22832 title = "Economical Encoding of Commas Between Strings", 22833 journal = j-CACM, 22834 volume = "21", 22835 number = "4", 22836 pages = "315--317", 22837 month = apr, 22838 year = "1978", 22839 CODEN = "CACMA2", 22840 ISSN = "0001-0782", 22841 MRclass = "68A10", 22842 MRnumber = "58 3648", 22843 mrreviewer = "John Cherniavsky", 22844 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22845 acknowledgement = ack-nhfb, 22846 classcodes = "C6130 (Data handling techniques)", 22847 corpsource = "Israel Inst. of Technol., Haifa, Israel", 22848 keywords = "commas; data handling; delimiters; encoding; extra cost; strings", 22849 treatment = "T Theoretical or Mathematical", 22850} 22851 22852@Article{Cheng:1978:GBV, 22853 author = "R. C. H. Cheng", 22854 title = "Generating beta variates with nonintegral shape parameters", 22855 journal = j-CACM, 22856 volume = "21", 22857 number = "4", 22858 pages = "317--322", 22859 month = apr, 22860 year = "1978", 22861 CODEN = "CACMA2", 22862 ISSN = "0001-0782", 22863 MRclass = "65C10", 22864 MRnumber = "58 13609", 22865 mrreviewer = "George Marsaglia", 22866 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22867 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib", 22868 acknowledgement = ack-nhfb, 22869 classcodes = "C7310 (Mathematics computing)", 22870 corpsource = "Univ. of Wales Inst. of Sci. and Technol., Cardiff, UK", 22871 country = "USA", 22872 descriptors = "RVG;", 22873 enum = "7128", 22874 keywords = "beta variates; computer timings; generating; method; nonintegral shape parameters; random number generation; random numbers; rejection; simplicity; speed; statistics", 22875 language = "English", 22876 location = "SEL: Wi", 22877 references = "0", 22878 revision = "16/01/94", 22879 treatment = "T Theoretical or Mathematical", 22880} 22881 22882@Article{Clark:1978:FAC, 22883 author = "Douglas W. Clark", 22884 title = "A Fast Algorithm for Copying List Structures", 22885 journal = j-CACM, 22886 volume = "21", 22887 number = "5", 22888 pages = "351--357", 22889 month = may, 22890 year = "1978", 22891 CODEN = "CACMA2", 22892 ISSN = "0001-0782", 22893 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22894 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 22895 abstract = "An algorithm is presented for copying an arbitrarily linked list structure into a block of contiguous storage locations without destroying the original list. Apart from a fixed number of program variables, no auxiliary storage, such as a stack, is used. The algorithm needs no mark bits and operates in linear time. It is shown to be significantly faster than Fisher's algorithm, the fastest previous linear-time algorithm for the same problem. Its speed comes mainly from its efficient list-traversal technique, which folds the processing stack into the structure being built, and from its classification of list cells into nine types, which enables processing operations to be optimized for each type.", 22896 acknowledgement = ack-nhfb, 22897 classcodes = "C6130 (Data handling techniques)", 22898 classification = "723", 22899 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 22900 journalabr = "Commun ACM", 22901 keywords = "arbitrarily linked; classification; computer programming; contiguous storage locations; copying; fast algorithm; linear time; list processing; list structure; list structures; list traversal technique", 22902 treatment = "T Theoretical or Mathematical", 22903} 22904 22905@Article{Jones:1978:LEE, 22906 author = "Anita K. Jones and Barbara H. Liskov", 22907 title = "A Language Extension for Expressing Constraints on Data Access", 22908 journal = j-CACM, 22909 volume = "21", 22910 number = "5", 22911 pages = "358--367", 22912 month = may, 22913 year = "1978", 22914 CODEN = "CACMA2", 22915 ISSN = "0001-0782", 22916 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22917 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib", 22918 abstract = "Controlled sharing of information is needed and desirable for many applications and is supported in operating systems by access control mechanisms. This work shows how to extend programming languages to provide controlled sharing. The extension permits expression of access constraints on shared data. Access constraints can apply both to simple objects, and to objects that are components of larger objects, such as bank account records in a bank's data base. The approach can be used to extend any strongly-typed language, but is particularly suitable for extending languages that support the notion of abstract data types.", 22919 acknowledgement = ack-nhfb, 22920 classcodes = "C6120 (File organisation); C6140D (High level languages)", 22921 classification = "723", 22922 corpsource = "Carnegie-Mellon Univ., Pittsburg, PA, USA", 22923 journalabr = "Commun ACM", 22924 keywords = "abstract data types; access control; computer programming languages; constraints; data access; data structures; language extension; mechanisms; programming languages", 22925 treatment = "T Theoretical or Mathematical", 22926} 22927 22928@Article{Geller:1978:TDA, 22929 author = "Matthew Geller", 22930 title = "Test Data as an Aid in Proving Program Correctness", 22931 journal = j-CACM, 22932 volume = "21", 22933 number = "5", 22934 pages = "368--375", 22935 month = may, 22936 year = "1978", 22937 CODEN = "CACMA2", 22938 ISSN = "0001-0782", 22939 MRclass = "68A05", 22940 MRnumber = "57 14575", 22941 mrreviewer = "Luigia Aiello", 22942 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22943 bibsource = "Compendex database", 22944 abstract = "Proofs of program correctness tend to be long and tedious, whereas testing, though useful in detecting errors, usually does not guarantee correctness. A technique is introduced whereby test data can be used in proving program correctness. In addition to simplifying the process of proving correctness, this method simplifies the process of providing accurate specification for a program. The applicability of this technique to procedures and recursive programs is demonstrated.", 22945 acknowledgement = ack-nhfb, 22946 classcodes = "C4240 (Programming and algorithm theory); C6150G (Diagnostic, testing, debugging and evaluating systems)", 22947 classification = "723", 22948 corpsource = "Univ. of Michigan, Ann Arbor, MI, USA", 22949 journalabr = "Commun ACM", 22950 keywords = "computer programming; procedures; program testing; programming theory; proving program correctness; recursive programs; specification; test data", 22951 treatment = "T Theoretical or Mathematical", 22952} 22953 22954@Article{Low:1978:ADS, 22955 author = "James R. Low", 22956 title = "Automatic Data Structure Selection: an Example and Overview", 22957 journal = j-CACM, 22958 volume = "21", 22959 number = "5", 22960 pages = "376--385", 22961 month = may, 22962 year = "1978", 22963 CODEN = "CACMA2", 22964 ISSN = "0001-0782", 22965 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22966 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib", 22967 abstract = "In the past, programming systems have provided only a single general purpose implementation for an abstract type. Thus the programs produced using abstract types were often inefficient in space or time. A system for automatically choosing efficient implementations for abstract types from a library of implementations for abstract types from a library of implementations is discussed. This process is discussed in detail for an example program. General issues in data structure selection are also reviewed.", 22968 acknowledgement = ack-nhfb, 22969 classcodes = "C6110 (Systems analysis and programming); C6120 (File organisation); C6150C (Compilers, interpreters and other processors)", 22970 classification = "723", 22971 corpsource = "Univ. of Rochester, Rochester, NY, USA", 22972 journalabr = "Commun ACM", 22973 keywords = "abstract data types; automatic programming; automatically; computer programming; data processing --- Data Structures; data structure selection; data structures; lists; program compilers; programs; sets", 22974 treatment = "T Theoretical or Mathematical", 22975} 22976 22977@Article{Karr:1978:IUP, 22978 author = "Michael Karr and David B. {Loveman III}", 22979 title = "Incorporation of Units into Programming Languages", 22980 journal = j-CACM, 22981 volume = "21", 22982 number = "5", 22983 pages = "385--391", 22984 month = may, 22985 year = "1978", 22986 CODEN = "CACMA2", 22987 ISSN = "0001-0782", 22988 bibdate = "Tue Mar 25 13:26:09 MST 1997", 22989 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/database.bib", 22990 abstract = "The issues of how a programming language might aid in keeping track of physical units (feet, sec, etc. ) are discussed. A method is given for the introduction of relationships among units (a watt is volts *amps, a yard is three feet) and subsequent automatic conversion based upon these relationships. Various proposals for syntax are considered.", 22991 acknowledgement = ack-nhfb, 22992 classcodes = "C6110 (Systems analysis and programming); C6140D (High level languages); C6150C (Compilers, interpreters and other processors)", 22993 classification = "723", 22994 corpsource = "Massachusetts Computer Associates Inc., Wakesfield, MA, USA", 22995 journalabr = "Commun ACM", 22996 keywords = "(measurement); automatic conversion; computer programming languages; physical units; program compilers; programming language; programming languages; relationships among; syntax; units", 22997 treatment = "T Theoretical or Mathematical", 22998} 22999 23000@Article{Hanson:1978:SPM, 23001 author = "David R. Hanson and Ralph E. Griswold", 23002 title = "The {SL5} procedure mechanism", 23003 journal = j-CACM, 23004 volume = "21", 23005 number = "5", 23006 pages = "392--400", 23007 month = may, 23008 year = "1978", 23009 CODEN = "CACMA2", 23010 ISSN = "0001-0782", 23011 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23012 bibsource = "Compendex database", 23013 abstract = "Description of an integrated procedure mechanism that permits procedures to be used as recursive functions or as coroutines. This integration is accomplished by treating procedures and their activation records (called environments) as data objects and by decomposing procedure invocation into three separate components at the source-language level. In addition, argument binding is under the control of the programmer, permitting the definition of various methods of argument transmission in the source language itself. The resulting procedure mechanism, which is part of the SL5 programming language, is well suited to goal-oriented problems and to other problems that are more readily programmed by using coroutines. Several examples are given.", 23014 acknowledgement = ack-nhfb, 23015 classcodes = "C6140D (High level languages); C6150C (Compilers, interpreters and other processors)", 23016 classification = "723", 23017 corpsource = "Yale Univ., New Haven, CT, USA", 23018 journalabr = "Commun ACM", 23019 keywords = "activation records; argument binding; argument transmission; computer programming languages; coroutines; procedure invocation; procedure mechanism; program interpreters; programming languages; recursive functions; SL5", 23020 treatment = "T Theoretical or Mathematical", 23021} 23022 23023@Article{Hayes-Roth:1978:IMT, 23024 author = "Frederick Hayes-Roth and John McDermott", 23025 title = "An Interference Matching Technique for Inducing Abstractions", 23026 journal = j-CACM, 23027 volume = "21", 23028 number = "5", 23029 pages = "401--411", 23030 month = may, 23031 year = "1978", 23032 CODEN = "CACMA2", 23033 ISSN = "0001-0782", 23034 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23035 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/colt.bib", 23036 abstract = "A method for inducing knowledge by abstraction from a sequence of training examples is described. \par The proposed method, interference matching, induces abstractions by finding relational properties common to two or more exemplars. Three tasks solved by a program that uses an interference-matching algorithm are presented. Several problems concerning the description of the training examples and the adequacy of interference matching are discussed, and directions for future research are considered.", 23037 acknowledgement = ack-nhfb, 23038 classcodes = "C1230 (Artificial intelligence); C6140D (High level languages)", 23039 classification = "723", 23040 corpsource = "Rand Corp., Santa Monica, CA, USA", 23041 journalabr = "Commun ACM", 23042 keywords = "abstraction; abstractions; artificial intelligence; complexity; computer metatheory --- Programming Theory; computer programming; generalization; graph matching; inducing knowledge; induction; informal retrieval; interference; interference matching; knowledge acquisition; knowledge representation; language learning; learning; partial matching; predicate discovery.; programming languages; relational properties; Rule induction; SPROUTER; training examples", 23043 treatment = "T Theoretical or Mathematical", 23044} 23045 23046@Article{Fleisher:1978:NSO, 23047 author = "J. M. Fleisher and R. R. Meyer", 23048 title = "New Sufficient Optimality Conditions for Integer Programming and Their Application", 23049 journal = j-CACM, 23050 volume = "21", 23051 number = "5", 23052 pages = "411--418", 23053 month = may, 23054 year = "1978", 23055 CODEN = "CACMA2", 23056 ISSN = "0001-0782", 23057 MRclass = "90C10", 23058 MRnumber = "58 15137", 23059 mrreviewer = "F. Giannessi", 23060 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23061 bibsource = "Compendex database", 23062 abstract = "Report on a new class of sufficient optimality conditions for pure and mixed integer programming problems. Some of the sets of sufficient conditions presented can be thought of as generalizations of optimality conditions based on primal-dual complementarity in linear programming. These sufficient conditions are particularly useful for the construction of difficult integer programming problems with known optimal solutions. These problems may then be used to test and\slash or ``benchmark'' integer programming codes.", 23063 acknowledgement = ack-nhfb, 23064 classcodes = "C1180 (Optimisation techniques); C1290 (Applications of systems theory)", 23065 classification = "723; 921", 23066 corpsource = "Univ. of Wisconsin, Madison, WI, USA", 23067 journalabr = "Commun ACM", 23068 keywords = "integer programming; mathematical programming; sufficient optimality conditions", 23069 treatment = "T Theoretical or Mathematical", 23070} 23071 23072@Article{Tadikamalla:1978:CGG, 23073 author = "Pandu R. Tadikamalla", 23074 title = "Computer Generation of Gamma Random Variables", 23075 journal = j-CACM, 23076 volume = "21", 23077 number = "5", 23078 pages = "419--422", 23079 month = may, 23080 year = "1978", 23081 CODEN = "CACMA2", 23082 ISSN = "0001-0782", 23083 MRclass = "65C10", 23084 MRnumber = "58 13614", 23085 mrreviewer = "George Marsaglia", 23086 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23087 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib", 23088 abstract = "A new method for generating random variables from the gamma distribution with nonintegral shape parameter alpha is proposed. This method is similar to two other methods recently given by N. D. Wallace and G. S. Fishman. It is compared with Fishman's and J. H. Ahrens and U. Dieter's methods. The core storage requirements and programming effort for this method are similar to those of Fishman's method. The proposed method is the same as Fishman's method for 1 less than equivalent to alpha less than 2 and is faster than Fishman's method for 3 less than equivalent to alpha less than equivalent to 19. Also, the proposed method is much simpler than Ahrens and Dieter's method and is faster for alpha less than equivalent to 8.", 23089 acknowledgement = ack-nhfb, 23090 classcodes = "C1140 (Probability and statistics); C7310 (Mathematics computing)", 23091 classification = "723; 922", 23092 corpsource = "Eastern Kentucky Univ., Richmond, KY, USA", 23093 country = "USA", 23094 date = "13/05/93", 23095 descriptors = "RVG;", 23096 enum = "7943", 23097 journalabr = "Commun ACM", 23098 keywords = "computer programming; mathematical statistics --- Random Number Generation", 23099 keywords = "core; gamma distribution; gamma random variables; generating; programming effort; statistics; storage requirements", 23100 language = "English", 23101 references = "0", 23102 treatment = "T Theoretical or Mathematical", 23103} 23104 23105@Article{Sites:1978:OSS, 23106 author = "Richard L. Sites", 23107 title = "Optimal Shift Strategy for a Block-Transfer {CCD} Memory", 23108 journal = j-CACM, 23109 volume = "21", 23110 number = "5", 23111 pages = "423--425", 23112 month = may, 23113 year = "1978", 23114 CODEN = "CACMA2", 23115 ISSN = "0001-0782", 23116 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23117 bibsource = "Compendex database", 23118 abstract = "It is shown that the optimal shift strategy for an electronic paging drum with variable but bounded rotation speed is to shift as quickly as possible over most of a cycle, then to shift as slowly as possible over the rest, where the fraction of a cycle to be covered slowly is a function of the square root of the ratio between the maximum and minimum rotation speeds. For a ratio of 100:1, 10\slash 11 of a full cycle should be covered quickly and 1/11 should be covered slowly. As device manufacturers increase this ratio, the average latency for a block transfer will slowly decrease. Increasing the raw shift speed will of course directly reduce both the latency time and the block transfer time.", 23119 acknowledgement = ack-nhfb, 23120 classcodes = "C6120 (File organisation)", 23121 classification = "722", 23122 corpsource = "Univ. of California, San Diego, La Jolla, CA, USA", 23123 journalabr = "Commun ACM", 23124 keywords = "best shift strategy; block transfer CCD memory; charge-coupled device circuits; computer operating systems; critical boundary; hurry up and wait; optimal; paging drum; serial shift registers; storage allocation; strategy", 23125 treatment = "T Theoretical or Mathematical", 23126} 23127 23128@Article{Zweben:1978:OMD, 23129 author = "S. H. Zweben and M. A. McDonald", 23130 title = "An Optimal Method for Deletion in One-Sided Height-Balanced Trees", 23131 journal = j-CACM, 23132 volume = "21", 23133 number = "6", 23134 pages = "441--445", 23135 month = jun, 23136 year = "1978", 23137 CODEN = "CACMA2", 23138 ISSN = "0001-0782", 23139 MRclass = "68E10 (68B05 68C25)", 23140 MRnumber = "80k:68054", 23141 mrreviewer = "A. T. Amin", 23142 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23143 bibsource = "Compendex database", 23144 abstract = "A one-sided height-balanced tree is a binary tree in which every mode's right subtree has a height which is equal to or exactly one greater than the height of its left subtree. It has an advantage over the more general AVL tree in that only one bit of balancing information is required (two bits are required for the AVL tree). It is shown that deletion of an arbitrary node of such a tree can be accomplished in O(log n) operations, where n is the number of nodes in the tree. Moreover the method is optimal in the sense that its complexity cannot be reduced in order of magnitude. This result, coupled with earlier results by D. S. Hirschberg, indicates that, of the three basic problems of insertion, deletion, and retrieval, only insertion is adversely affected by this modification of an AVL tree.", 23145 acknowledgement = ack-nhfb, 23146 classcodes = "C4240 (Programming and algorithm theory); C6120 (File organisation)", 23147 classification = "723", 23148 corpsource = "Ohio State Univ., Columbus, OH, USA", 23149 journalabr = "Commun ACM", 23150 keywords = "arbitrary node; binary tree; computer programming; data structures; deletion; one; optimal method; programming theory; sided height balanced trees; trees (mathematics)", 23151 treatment = "T Theoretical or Mathematical", 23152} 23153 23154@Article{Driscoll:1978:STA, 23155 author = "James R. Driscoll and Y. Edmund Lien", 23156 title = "A Selective Traversal Algorithm for Binary Search Trees", 23157 journal = j-CACM, 23158 volume = "21", 23159 number = "6", 23160 pages = "445--447", 23161 month = jun, 23162 year = "1978", 23163 CODEN = "CACMA2", 23164 ISSN = "0001-0782", 23165 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23166 bibsource = "Compendex database", 23167 abstract = "The problem of selecting data items from a binary search tree according to a list of range conditions is considered. The process of visiting a minimal number of nodes to retrieve data satisfying the range conditions is called selective traversal. Presented in this paper is an algorithm for selective traversal which uses a tag field for each node in the tree. The algorithm is particularly useful and efficient when examination of data is more time consuming than examination of a tag field.", 23168 acknowledgement = ack-nhfb, 23169 classcodes = "C4240 (Programming and algorithm theory); C6120 (File organisation)", 23170 classification = "723", 23171 corpsource = "Florida Technol. Univ., Orlando, FL, USA", 23172 journalabr = "Commun ACM", 23173 keywords = "binary search tree; binary search trees; computer programming; Data retrieval; data structures; programming theory; range conditions; retrieve; selective traversal; selective traversal algorithm; tag field; tree traversal; trees (mathematics)", 23174 treatment = "T Theoretical or Mathematical", 23175} 23176 23177@Article{Cohen:1978:ADP, 23178 author = "Jacques Cohen and Martin S. Roth", 23179 title = "Analyses of Deterministic Parsing Algorithms", 23180 journal = j-CACM, 23181 volume = "21", 23182 number = "6", 23183 pages = "448--458", 23184 month = jun, 23185 year = "1978", 23186 CODEN = "CACMA2", 23187 ISSN = "0001-0782", 23188 MRclass = "68A20", 23189 MRnumber = "58 13920", 23190 mrreviewer = "David B. Benson", 23191 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23192 bibsource = "Compendex database", 23193 abstract = "An approach is presented for determining the minimum, maximum, and average times to parse sentences acceptable by a deterministic parser. These quantities are presented in the form of symbolic formulas, called time-formulas. The variables in these formulas represent not only the length of the input string but also the time to perform elementary operations such as pushing, popping, subscripting, iterating, etc. By binding to the variables actual numerical values corresponding to a given compiler-machine configuration, one can determine the execution time for that configuration. Time-formulas are derived by examining the grammar rules and the program representing the algorithm one wishes to analyze. The approach is described by using a specific grammar that defines simple arithmetic expressions.", 23194 acknowledgement = ack-nhfb, 23195 classcodes = "C4210 (Formal logic); C4240 (Programming and algorithm theory)", 23196 classification = "723", 23197 corpsource = "Brandeis Univ., Waltham, MA, USA", 23198 journalabr = "Commun ACM", 23199 keywords = "algorithm theory; average times; benchmarks; bottom up SLR(1) parser; computer programming languages; deterministic parsing algorithms; estimates; grammars; maximum time; minimum time; PDP 10; recursive descent LL(1) parser; relative efficiencies; top down", 23200 treatment = "T Theoretical or Mathematical", 23201} 23202 23203@Article{Mickunas:1978:AER, 23204 author = "M. Dennis Mickunas and John A. Modry", 23205 title = "Automatic Error Recovery for {LR} Parsers", 23206 journal = j-CACM, 23207 volume = "21", 23208 number = "6", 23209 pages = "459--465", 23210 month = jun, 23211 year = "1978", 23212 CODEN = "CACMA2", 23213 ISSN = "0001-0782", 23214 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23215 bibsource = "Compendex database", 23216 abstract = "A scheme is given for detecting and recovering from syntax errors in programs. The scheme, which is based on LR parsing, is driven by information which is directly and automatically obtainable from the information that is already present in an LR parser. The approach, which is patterned after that of Levy and Graham and Rhodes, appears to provide error recovery which is both simple and powerful.", 23217 acknowledgement = ack-nhfb, 23218 classcodes = "C6150G (Diagnostic, testing, debugging and evaluating systems)", 23219 classification = "723", 23220 corpsource = "Univ. of Illinois, Urbana-Champaign, IL, USA", 23221 journalabr = "Commun ACM", 23222 keywords = "automatically; compilers; computer programming languages; detecting; error correction; error recovery; fault tolerant computing; LR parsers; program; syntax errors; system recovery", 23223 treatment = "T Theoretical or Mathematical", 23224} 23225 23226@Article{Lientz:1978:CAS, 23227 author = "B. P. Lientz and E. B. Swanson and G. E. Tompkins", 23228 title = "Characteristics of Application Software Maintenance", 23229 journal = j-CACM, 23230 volume = "21", 23231 number = "6", 23232 pages = "466--471", 23233 month = jun, 23234 year = "1978", 23235 CODEN = "CACMA2", 23236 ISSN = "0001-0782", 23237 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23238 bibsource = "Compendex database", 23239 abstract = "Maintenance and enhancement of application software consume a major portion of the total life cycle cost of a system. Rough estimates of the total systems and programming resources consumed range as high as 75-80 percent in each category. However, the area has been given little attention in the literature. To analyze the problems in this area a questionnaire was developed and pretested. It was then submitted to 120 organizations. Respondents totaled 69. Responses were analyzed with the SPSS statistical package. The results of the analysis are examined in detail.", 23240 acknowledgement = ack-nhfb, 23241 classcodes = "C0310 (EDP management); C6110 (Systems analysis and programming)", 23242 classification = "723", 23243 corpsource = "Univ. of California, Los Angeles, CA, USA", 23244 journalabr = "Commun ACM", 23245 keywords = "application software maintenance; characteristics; computer programming; DP management; enhancement; extension; management; programming; resources; systems; user demands", 23246 treatment = "G General Review", 23247} 23248 23249@Article{Chrysler:1978:SBD, 23250 author = "Earl Chrysler", 23251 title = "Some Basic Determinants of Computer Programming Productivity", 23252 journal = j-CACM, 23253 volume = "21", 23254 number = "6", 23255 pages = "472--483", 23256 month = jun, 23257 year = "1978", 23258 CODEN = "CACMA2", 23259 ISSN = "0001-0782", 23260 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23261 bibsource = "Compendex database", 23262 abstract = "Examination of the relationship between processing characteristics of programs and experience characteristics of programmers and program development time. The ultimate objective was to develop a technique for predicting the amount of time necessary to create a computer program. The fifteen program characteristics hypothesized as being associated with an increase in programming time required are objectively measurable from preprogramming specifications. The five programmer characteristics are experience-related and are also measurable before a programming task is begun. Nine program characteristics emerged as major influences on program development time, each associated with increased program development time. All five programmer characteristics are found to be related to reduced program development time.", 23263 acknowledgement = ack-nhfb, 23264 classcodes = "C0310 (EDP management); C6110 (Systems analysis and programming)", 23265 classification = "723", 23266 corpsource = "Univ. of Wisconsin, Parkside, WI, USA", 23267 journalabr = "Commun ACM", 23268 keywords = "characteristics; computer programming; computer programming productivity; determinants; DP management; forecasting; predicting; program development time; programmers; programming", 23269 treatment = "P Practical", 23270} 23271 23272@Article{Kling:1978:AWC, 23273 author = "Rob Kling", 23274 title = "Automated Welfare Client-Tracking and Service Integration: the Political Economy of Computing", 23275 journal = j-CACM, 23276 volume = "21", 23277 number = "6", 23278 pages = "484--493", 23279 month = jun, 23280 year = "1978", 23281 CODEN = "CACMA2", 23282 ISSN = "0001-0782", 23283 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23284 bibsource = "Compendex database", 23285 abstract = "The impact of an automated client-tracking system on the clients, caseworkers, administrators, and operations of the welfare agencies that use it are reported. The major impact of this system was to enhance the administrative attractiveness of the using agencies in the eyes of funders rather than to increase their internal administrative efficiency. This impact is a joint product of both the technical features of the computer-based system and of the organizational demands placed upon different agencies, administrators, and caseworkers. It illustrates the way ``successful'' automated information systems fit the political economies of the groups that use them.", 23286 acknowledgement = ack-nhfb, 23287 classcodes = "C0230 (Economic, social and political aspects of computing); C7130 (Public administration)", 23288 classification = "723", 23289 corpsource = "Univ. of California, Irvine, CA, USA", 23290 journalabr = "Commun ACM", 23291 keywords = "administrative attractiveness; client; computing; data processing; government data processing; impact; political economies; service integration; social aspects of automation; social impact; tracking; welfare agencies", 23292 treatment = "G General Review", 23293} 23294 23295@Article{Gelenbe:1978:PRR, 23296 author = "E. Gelenbe and D. Derochette", 23297 title = "Performance of Rollback Recovery Systems Under Intermittent Failures", 23298 journal = j-CACM, 23299 volume = "21", 23300 number = "6", 23301 pages = "493--499", 23302 month = jun, 23303 year = "1978", 23304 CODEN = "CACMA2", 23305 ISSN = "0001-0782", 23306 MRclass = "68H05", 23307 MRnumber = "80a:68113", 23308 mrreviewer = "Menachem Dishon", 23309 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23310 bibsource = "Compendex database", 23311 abstract = "A mathematical model of a transaction-oriented system under intermittent failures is proposed. The system is assumed to operate with a checkpointing and rollback\slash recovery method to ensure reliable information processing. The model is used to derive the principal performance measures, including availability, response time, and the system saturation point.", 23312 acknowledgement = ack-nhfb, 23313 classcodes = "C6150J (Operating systems)", 23314 classification = "723", 23315 corpsource = "Univ. Paris-Sud, Orsay, France", 23316 journalabr = "Commun ACM", 23317 keywords = "availability; checkpointing; computer operating systems; data base systems; intermittent failures; mathematical model; performance measures; response time; rollback recovery systems; system recovery; system saturation point", 23318 treatment = "T Theoretical or Mathematical", 23319} 23320 23321@Article{Teorey:1978:GEI, 23322 author = "Toby J. Teorey", 23323 title = "General Equations for Idealized {CPU-I/O} Overlap Configurations", 23324 journal = j-CACM, 23325 volume = "21", 23326 number = "6", 23327 pages = "500--507", 23328 month = jun, 23329 year = "1978", 23330 CODEN = "CACMA2", 23331 ISSN = "0001-0782", 23332 MRclass = "68A05", 23333 MRnumber = "58 3643", 23334 mrreviewer = "A. D. Booth", 23335 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23336 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 23337 abstract = "General equations are derived for estimating the maximum possible utilization of main storage partitions, CPU and I/O devices under different conditions in an idealized CPU-I/O overlap model of multiprogrammed computer systems. The equations are directly applicable to any configuration consisting of sets of identical CPU's, I/O processors, main storage partitions and user tasks. Examples are provided to illustrate the use of the equations to compute effective processing time per record and expected timesharing response time under both balanced and unbalanced resource utilization conditions.", 23338 acknowledgement = ack-nhfb, 23339 classcodes = "C6150J (Operating systems)", 23340 classification = "723", 23341 corpsource = "Univ. of Michigan, Ann Arbor, MI, USA", 23342 journalabr = "Commun ACM", 23343 keywords = "balanced; computer systems programming; CPU; devices; expected timesharing response time; I/O; input-output programs; main storage partitions; multiprogrammed computer systems; multiprogramming; overlap configurations; per record; processing time; storage allocation; time-sharing systems; unbalanced", 23344 treatment = "T Theoretical or Mathematical", 23345} 23346 23347@Article{Waltz:1978:ELQ, 23348 author = "David L. Waltz", 23349 title = "An {English} Language Query Answering System for a Large Relational Data Base", 23350 journal = j-CACM, 23351 volume = "21", 23352 number = "7", 23353 pages = "526--539", 23354 month = jul, 23355 year = "1978", 23356 CODEN = "CACMA2", 23357 ISSN = "0001-0782", 23358 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23359 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 23360 abstract = "By typing requests in English, casual users will be able to obtain explicit answers from a large relational database of aircraft flight and maintenance data using a system called PLANES. The design and implementation of this system is described and illustrated with detailed examples of the operation of system components and examples of overall system operation. Also included are discussions of important issues in programming natural language systems for limited domains, and the relationship of this system to others.", 23361 acknowledgement = ack-nhfb, 23362 annote = "the PLANES system.", 23363 classcodes = "C6120 (File organisation); C7250 (Information storage and retrieval); C7460 (Aerospace engineering computing)", 23364 classification = "723", 23365 corpsource = "Univ. of Illinois, Urbana-Champaign, IL, USA", 23366 journalabr = "Commun ACM", 23367 keywords = "aerospace computing; aircraft; data base systems; database management systems; English language; flight; information retrieval; large; maintenance; PLANES; question answering system; relational database", 23368 treatment = "A Application; T Theoretical or Mathematical", 23369 xxtitle = "An {English} language question answering system for a large relational database", 23370} 23371 23372@Article{Fredman:1978:CCM, 23373 author = "Michael L. Fredman and Bruce Weide", 23374 title = "On the complexity of computing the measure of {$\bigcup[a_i,b_i]$}", 23375 journal = j-CACM, 23376 volume = "21", 23377 number = "7", 23378 pages = "540--544", 23379 month = jul, 23380 year = "1978", 23381 CODEN = "CACMA2", 23382 ISSN = "0001-0782", 23383 MRclass = "68A20", 23384 MRnumber = "58 13924", 23385 mrreviewer = "Jan van Leeuwen", 23386 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23387 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/78.bib", 23388 abstract = "The decision tree complexity of computing the measure of the union of $n$ (possibly overlapping) intervals is shown to be $\Omega(n \log n)$, even if comparisons between linear functions of the interval endpoints are allowed. The existence of an $\Omega (n \log n)$ lower bound to determine whether any two of $n$ real numbers are within $\epsilon$ of each other is also demonstrated. These problems provide an excellent opportunity for discussing the effects of the computational model on the ease of analysis and on the results produced.", 23389 acknowledgement = ack-nhfb, 23390 classcodes = "C4240 (Programming and algorithm theory)", 23391 classification = "723", 23392 corpsource = "Univ. of California, San Diego, CA, USA", 23393 journalabr = "Commun ACM", 23394 keywords = "algorithm theory; computational complexity; computational model; computer metatheory; computer programming; computing; decision tree complexity; intervals; measure; union", 23395 treatment = "T Theoretical or Mathematical", 23396} 23397 23398@Article{Chin:1978:ADN, 23399 author = "Francis Y. Chin", 23400 title = "An ${O}(n)$ Algorithm for Determining a Near-Optimal Computation Order of Matrix Chain Products", 23401 journal = j-CACM, 23402 volume = "21", 23403 number = "7", 23404 pages = "544--549", 23405 month = jul, 23406 year = "1978", 23407 CODEN = "CACMA2", 23408 ISSN = "0001-0782", 23409 MRclass = "68C25 (65F05)", 23410 MRnumber = "80a:68037", 23411 mrreviewer = "Ondrej S{\'y}kora", 23412 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23413 bibsource = "Compendex database", 23414 abstract = "Discussion of the computation of matrix chain products of the form M//1 multiplied by M//2 multiplied by\ldots{} multiplied by M//n where M//i's are matrices. The order in which the matrices are computed affects the number of operations. A sufficient condition about the association of the matrices in the optimal order is presented. An O(n) algorithm to find an order of computation which takes less than 25 percent longer than the optimal time T(opt) is also presented. In most cases, the algorithm yields the optimal order or an order which takes only a few percent longer than T(opt) (less than 1 percent on the average).", 23415 acknowledgement = ack-nhfb, 23416 classcodes = "C4140 (Linear algebra)", 23417 classification = "723", 23418 corpsource = "Univ. of Alberta, Edmonton, Alta., Canada", 23419 journalabr = "Commun ACM", 23420 keywords = "algorithm; computation order; computer programming; matrix algebra; matrix chain products; optimal order", 23421 treatment = "T Theoretical or Mathematical", 23422} 23423 23424@Article{Perl:1978:ISL, 23425 author = "Yehoshua Perl and Alon Itai and Haim Avni", 23426 title = "Interpolation Search --- {A} Log Log {N} Search", 23427 journal = j-CACM, 23428 volume = "21", 23429 number = "7", 23430 pages = "550--553", 23431 month = jul, 23432 year = "1978", 23433 CODEN = "CACMA2", 23434 ISSN = "0001-0782", 23435 MRclass = "68A50", 23436 MRnumber = "58 8582", 23437 mrreviewer = "Amitava Bagchi", 23438 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23439 bibsource = "Compendex database", 23440 abstract = "Interpolation search is a method of retrieving a desired record by key in an ordered file by using the value of the key and the statistical distribution of the keys. It is shown that on the average log log N file accesses are required to retrieve a key, assuming that the N keys are uniformly distributed. The number of extra accesses is also estimated and shown to be very low. The same holds if the cumulative distribution function of the keys is known. Computational experiments confirm these results.", 23441 acknowledgement = ack-nhfb, 23442 classcodes = "C6120 (File organisation)", 23443 classification = "723", 23444 corpsource = "Bar-Ilan Univ., Ramat-Gan, Israel", 23445 journalabr = "Commun ACM", 23446 keywords = "Average number of accesses; binary search; computer programming; database; file organisation; interpolation search; key; log; logN file accesses; ordered file; retrieval; retrieve; searching; statistical distribution of the keys; uniform distribution", 23447 treatment = "T Theoretical or Mathematical", 23448} 23449 23450@Article{Halatsis:1978:PHT, 23451 author = "Constantine Halatsis and George Philokyprou", 23452 title = "Pseudochaining in Hash Tables", 23453 journal = j-CACM, 23454 volume = "21", 23455 number = "7", 23456 pages = "554--557", 23457 month = jul, 23458 year = "1978", 23459 CODEN = "CACMA2", 23460 ISSN = "0001-0782", 23461 MRclass = "68A50", 23462 MRnumber = "58 3784", 23463 mrreviewer = "Eberhard Ludde", 23464 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23465 bibsource = "Compendex database", 23466 abstract = "Presentation of pseudochaining as a new collision-resolution method. Pseudochaining is half way between open addressing and chaining. It owes its name to the fact that link fields are present in each cell of the hash table which permits ``chaining'' of the first overflow items in the table. The efficiency of the method is derived and a tradeoff analysis is given.", 23467 acknowledgement = ack-nhfb, 23468 classcodes = "C6120 (File organisation)", 23469 classification = "723", 23470 corpsource = "NRC 'Demokritos', Athens, Greece", 23471 journalabr = "Commun ACM", 23472 keywords = "collision resolution method; computer programming; efficiency; file organisation; hash tables; pseudochaining; tradeoff analysis", 23473 treatment = "T Theoretical or Mathematical", 23474} 23475 23476@Article{Lamport:1978:TCO, 23477 author = "Leslie Lamport", 23478 title = "Time, Clocks, and the Ordering of Events in a Distributed System", 23479 journal = j-CACM, 23480 volume = "21", 23481 number = "7", 23482 pages = "558--565", 23483 month = jul, 23484 year = "1978", 23485 CODEN = "CACMA2", 23486 ISSN = "0001-0782", 23487 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23488 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib", 23489 abstract = "The concept of one event happening before another in a distributed system is examined, and is shown to define a partial ordering of the events. A distributed algorithm is given for synchronizing a system of logical clocks which can be used to totally order the events. The use of the total ordering is illustrated with a method for solving synchronization problems. The algorithm is then specialized for synchronizing physical clocks, and a bound is derived on how far out of synchrony the clocks can become.", 23490 acknowledgement = ack-nhfb, 23491 annote = "Classic paper on logical clocks. A classic paper on synchronization. Reproduced in ``Distributed Computing: Concepts and Implementations'' edited by McEntire, O'Reilly and Larson, IEEE, 1984. The concept of one event happening before another in a distributed system is examined, and is shown to define a partial ordering of the events. A distributed algorithm is given for synchronising a system of logical clocks which can be used to totally order the events. The use of the total ordering is illustrated with a method for solving synchronisation problems. The algorithm is then specialised for synchronising physical clocks, and a bound is derived on how far out of synchrony the clocks can become.", 23492 classcodes = "C6150J (Operating systems)", 23493 classification = "723", 23494 journalabr = "Commun ACM", 23495 keywords = "5.29 distributed processing computer networks multiprocessing programs ordering of events distributed system synchronising total ordering clocks computer networks multiprocessing bsatya enm; clock synchronization; clocks; computer networks; computer operating systems; distributed computer systems; distributed processing; distributed system; distributed systems; dmp; grecommended91 CR categories: 4.32; jw; multiprocess systems; multiprocessing; ordering; ordering of events; programs; synchronising; total", 23496 treatment = "T Theoretical or Mathematical", 23497} 23498 23499@Article{Baker:1978:SBL, 23500 author = "Henry Givens {Baker, Jr.}", 23501 title = "Shallow Binding in {Lisp} 1.5", 23502 journal = j-CACM, 23503 volume = "21", 23504 number = "7", 23505 pages = "565--569", 23506 month = jul, 23507 year = "1978", 23508 CODEN = "CACMA2", 23509 ISSN = "0001-0782", 23510 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23511 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/lisp.bib", 23512 abstract = "Shallow binding is a scheme which allows the value of a variable to be accessed in a bounded amount of computation. An elegant model for shallow binding in Lisp 1.5 is presented in which context-switching is an environment tree transformation called rerooting. Rerooting is completely general and reversible, and is optional in the sense that a Lisp 1.5 interpreter will operate correctly whether or not rerooting is invoked on every context change. Since rerooting leaves assoc left bracket v, a right bracket invariant, for all variables v and all environments a, the programmer can have access to a rerooting primitive, shallow left bracket right bracket, which gives him dynamic control over whether accesses are shallow or deep, and which affects only the speed of execution of a program, not its semantics.", 23513 acknowledgement = ack-nhfb, 23514 classcodes = "C6140D (High level languages)", 23515 classification = "723", 23516 corpsource = "MIT, Cambridge, MA, USA", 23517 journalabr = "Commun ACM", 23518 keywords = "computer programming languages; context switching; environment; LISP; LISP 1.5; rerooting; shallow binding; tree transformation", 23519 treatment = "T Theoretical or Mathematical", 23520} 23521 23522@Article{Samet:1978:PCH, 23523 author = "Hanan Samet", 23524 title = "Proving the Correctness of Heuristically Optimized Code", 23525 journal = j-CACM, 23526 volume = "21", 23527 number = "7", 23528 pages = "570--582", 23529 month = jul, 23530 year = "1978", 23531 CODEN = "CACMA2", 23532 ISSN = "0001-0782", 23533 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23534 bibsource = "Compendex database", 23535 abstract = "A system for proving that programs written in a high level language are correctly translated to a low level language is described. A primary use of the system is as a postoptimization step in code generation. The low level language programs need not be generated by a compiler and in fact could be hand coded. Examples of the usefulness of such a system are given. Some interesting results are the ability to handle programs that implement recursion by bypassing the start of the program, and the detection and pinpointing of a wide class of errors in the low level language programs. The examples demonstrate that optimization of the genre of this paper can result in a substantially faster operation and the saving of memory in terms of program and stack sizes.", 23536 acknowledgement = ack-nhfb, 23537 classcodes = "C4240 (Programming and algorithm theory); C6150C (Compilers, interpreters and other processors); C6150G (Diagnostic, testing, debugging and evaluating systems)", 23538 classification = "723", 23539 corpsource = "Univ. of Maryland, College Park, MO, USA", 23540 journalabr = "Commun ACM", 23541 keywords = "code generation; compiler; computer programming languages; correctness proving; heuristically optimised code; high level language; low level language; postoptimisation; program compilers; program testing", 23542 treatment = "T Theoretical or Mathematical", 23543 xxtitle = "Proving the correctness of heuristically optimised code", 23544} 23545 23546@Article{Shostak:1978:ARA, 23547 author = "Robert E. Shostak", 23548 title = "An Algorithm for Reasoning About Equality", 23549 journal = j-CACM, 23550 volume = "21", 23551 number = "7", 23552 pages = "583--585", 23553 month = jul, 23554 year = "1978", 23555 CODEN = "CACMA2", 23556 ISSN = "0001-0782", 23557 MRclass = "02-04 02B10", 23558 MRnumber = "58 4976", 23559 mrreviewer = "A. Pliuskeviciene", 23560 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23561 bibsource = "Compendex database", 23562 abstract = "A simple technique for reasoning about equalities that is fast and complete for ground formulas with function symbols and equality is presented. A proof of correctness is given as well.", 23563 acknowledgement = ack-nhfb, 23564 classcodes = "C4240 (Programming and algorithm theory); C6150G (Diagnostic, testing, debugging and evaluating systems)", 23565 classification = "723", 23566 corpsource = "Stanford Res. Inst., Menlo Park, CA, USA", 23567 journalabr = "Commun ACM", 23568 keywords = "algorithm; computer programming; correctness; equality; program testing; reasoning; theorem proving", 23569 treatment = "T Theoretical or Mathematical", 23570} 23571 23572@Article{Chattergy:1978:AAC, 23573 author = "Rahul Chattergy and Udo W. Pooch", 23574 title = "Analysis of the Availability of Computer Systems Using Computer-Aided Algebra", 23575 journal = j-CACM, 23576 volume = "21", 23577 number = "7", 23578 pages = "586--591", 23579 month = jul, 23580 year = "1978", 23581 CODEN = "CACMA2", 23582 ISSN = "0001-0782", 23583 MRclass = "60K20 (68A15)", 23584 MRnumber = "58 3091", 23585 mrreviewer = "Ralph L. Disney", 23586 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23587 bibsource = "Compendex database", 23588 abstract = "Analytical results, related to the availability of a computer system constructed of unreliable processors, are presented in this paper. These results are obtained by using various computer-aided algebraic manipulation techniques. A major purpose of this paper is to demonstrate that the difficulties of obtaining analytical solutions to Markov processes can be considerably reduced by the application of symbol manipulation programs. Since many physical systems can be modeled by Markov and semi-Markov processes, the potential range of application of these techniques is much wider than the problem of availability analyzed.", 23589 acknowledgement = ack-nhfb, 23590 classcodes = "C4290 (Other computer theory); C5420 (Mainframes and minicomputers)", 23591 classification = "722; 723", 23592 corpsource = "Univ. of Hawaii, Honolulu, HI, USA", 23593 journalabr = "Commun ACM", 23594 keywords = "algebraic manipulation; availability; computer systems; computer systems, digital; manipulation; Markov processes; real-time systems; reliability; symbol; unreliable processors", 23595 treatment = "T Theoretical or Mathematical", 23596} 23597 23598@Article{Snyder:1978:BRE, 23599 author = "Lawrence Snyder", 23600 title = "{B-Trees} Re-examined", 23601 journal = j-CACM, 23602 volume = "21", 23603 number = "7", 23604 pages = "594--594", 23605 month = jul, 23606 year = "1978", 23607 CODEN = "CACMA2", 23608 ISSN = "0001-0782", 23609 bibdate = "Sat Jan 18 15:40:20 1997", 23610 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 23611} 23612 23613@Article{Backus:1978:CPB, 23614 author = "John Backus", 23615 title = "Can Programming Be Liberated From the {von Neumann} Style? {A} Functional Style and its Algebra of Programs", 23616 journal = j-CACM, 23617 volume = "21", 23618 number = "8", 23619 pages = "613--641", 23620 month = aug, 23621 year = "1978", 23622 CODEN = "CACMA2", 23623 ISSN = "0001-0782", 23624 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23625 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib and ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib", 23626 note = "Reproduced in ``Selected Reprints on Dataflow and Reduction Architectures'' ed. S. S. Thakkar, IEEE, 1987, pp. 215-243.", 23627 abstract = "Conventional programming languages are growing ever more enormous, but not stronger. Inherent defects at the most basic level cause them to be both fat and weak: their primitive word-at-a-time style of programming inherited from their common ancestor, the von Neumann computer; their division of programming into a world of expressions and a world of statements; their inability to effectively use powerful combining forms for building new programs from existing ones; and their lack of useful mathematical properties for reasoning about programs. An alternative functional style of programming is founded on the use of combining forms for creating programs. Functional programs deal with structured data, are often nonrepetitive and nonrecursive, are hierarchically constructed, do not name their arguments, and do not require the complex machinery of procedure declarations to become generally applicable. Combining forms can use high level programs to build still higher level ones in a style not possible in conventional languages.", 23628 acknowledgement = ack-nhfb, 23629 annote = "Conventional programming languages are growing ever more enormous, but not stronger. Inherent defects at the most basic level cause them to be both fat and weak: their primitive word-at-a-time style of programming inherited from their common ancestor - the von Neumann computer, their close coupling of semantics to state transitions, their division of programming into a world of expressions and a world of statements, their inability to effectively \ldots{}", 23630 classcodes = "C6140 (Programming languages)", 23631 classification = "723", 23632 corpsource = "IMB Res. Lab., San Jose, CA, USA", 23633 descriptors = "Programming language; reliability; future outlook; von Neumann computer; applicative computing system;", 23634 journalabr = "Commun ACM", 23635 keywords = "4.29; 5.20; 5.24; 5.26; algebra of programs; applicative computing systems; combining forms; computer metatheory; conventional languages; CR categories: 4.20; functional style; grecommended91; Key words and phrases: functional programming; metacomposition; models of computing systems; program correctness; program termination; program transformation; programming languages; Rhighnam; structured data; theory ak; Turing award lecture; von Neuman style; von Neumann computers; von Neumann languages", 23636 treatment = "T Theoretical or Mathematical", 23637} 23638 23639@Article{Kling:1978:VCS, 23640 author = "R. Kling", 23641 title = "Value conflicts and social choice in electronic funds transfer system developments", 23642 journal = j-CACM, 23643 volume = "21", 23644 number = "8", 23645 pages = "642--657", 23646 month = aug, 23647 year = "1978", 23648 CODEN = "CACMA2", 23649 ISSN = "0001-0782", 23650 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23651 acknowledgement = ack-nhfb, 23652 classcodes = "C7120 (Financial computing)", 23653 corpsource = "Univ. of California, Irvine, CA, USA", 23654 keywords = "EFT; EFTS; electronic funds transfer; privacy of transactions; reliability; social choice; system", 23655 treatment = "E Economic; G General Review", 23656} 23657 23658@Article{Hirschberg:1978:FPS, 23659 author = "D. S. Hirschberg", 23660 title = "Fast Parallel Sorting Algorithms", 23661 journal = j-CACM, 23662 volume = "21", 23663 number = "8", 23664 pages = "657--661", 23665 month = aug, 23666 year = "1978", 23667 CODEN = "CACMA2", 23668 ISSN = "0001-0782", 23669 MRclass = "68C25", 23670 MRnumber = "80c:68028", 23671 mrreviewer = "J. Misra", 23672 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23673 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib", 23674 abstract = "A parallel bucket-sort algorithm is presented that requires time O(log n) and the use of n processors. The algorithm makes use of a technique that requires more space than the product of processors and time. A realistic model is used in which no memory contention is permitted. A procedure is also presented to sort n numbers in time O(k log n) using n**1** plus **1**/**k processors, for k an arbitrary integer. The model of computation for this procedure permits simultaneous fetches from the same memory location.", 23675 acknowledgement = ack-nhfb, 23676 classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", 23677 classification = "723", 23678 comment = "``A parallel bucket--sort algorithm is presented that requires time $O(\log n)$ and the use of $n$ processors. The algorithm makes use of a technique that requires more space than the product of processors and time. A realistic model is used in which no memory contention is permitted. A procedure is also presented to sort $n$ numbers in time $O(k \log n)$ using $n^{1+1/k}$ processors, for $k$ an arbitrary integer. The model of computation for this procedure permits simultaneous fetches from the same memory location.''", 23679 corpsource = "Rice Univ., Houston, TX, USA", 23680 journalabr = "Commun ACM", 23681 keywords = "bucket sort algorithm; computer programming --- Subroutines; computer systems programming; parallel processing; parallel sorting algorithms; sorting", 23682 treatment = "T Theoretical or Mathematical", 23683} 23684 23685@Article{Morris:1978:TSE, 23686 author = "F. Lockwood Morris", 23687 title = "A Time- and Space-Efficient Garbage Compaction Algorithm", 23688 journal = j-CACM, 23689 volume = "21", 23690 number = "8", 23691 pages = "662--665", 23692 month = aug, 23693 year = "1978", 23694 CODEN = "CACMA2", 23695 ISSN = "0001-0782", 23696 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23697 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/reynolds.bib", 23698 abstract = "Given an area of storage containing scattered, marked nodes of differing sizes, one may wish to rearrange them into a compact mass at one end of the area while revising all pointers to marked nodes to show their new locations. An algorithm is described which accomplishes this task in linear time relative to the size of the storage area, and in a space of the order of one bit for each pointer. The algorithm operates by reversibly encoding the situation (that a collection of locations point to a single location) by a linear list, emanating from the pointed-to location, passing through the pointing locations, and terminating with the pointed-to location's transplanted contents.", 23699 acknowledgement = ack-nhfb, 23700 classcodes = "C6120 (File organisation)", 23701 classification = "723", 23702 corpsource = "Syracuse Univ., Syracuse, NY, USA", 23703 journalabr = "Commun ACM", 23704 keywords = "computer operating systems --- Storage Allocation; computer programming; encoding; garbage compaction algorithm; pointers; pointing locations; reversibly; storage; storage management", 23705 treatment = "T Theoretical or Mathematical", 23706} 23707 23708@Article{Hoare:1978:CSP, 23709 author = "C. A. R. Hoare", 23710 title = "Communicating Sequential Processes", 23711 journal = j-CACM, 23712 volume = "21", 23713 number = "8", 23714 pages = "666--677", 23715 month = aug, 23716 year = "1978", 23717 CODEN = "CACMA2", 23718 ISSN = "0001-0782", 23719 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23720 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.misc.bib", 23721 note = "See corrigendum \cite{Hoare:1978:CCS}.", 23722 abstract = "This paper suggests that input and output are basic primitives of programming and that parallel composition of communicating sequential processes is a fundamental program structuring method. When combined with a development of Dijkstra's guarded command, these concepts are surprisingly versatile. \par Their use is illustrated by sample solutions of a variety of familiar programming exercises.", 23723 acknowledgement = ack-nhfb, 23724 annote = "This paper is now expanded into an excellent book detailed by Hoare and published by Prentice-Hall. This paper is reproduced in Kuhn and Padua's (1981, IEEE) survey ``Tutorial on Parallel Processing.'' Reproduced in ``Distributed Computing: Concepts and Implementations'' edited by McEntire, O'Reilly and Larson, IEEE, 1984. Somewhat dated.", 23725 classcodes = "C6110 (Systems analysis and programming)", 23726 classification = "723", 23727 corpsource = "Queen's Univ., Belfast, UK", 23728 journalabr = "Commun ACM", 23729 keywords = "4.22; 4.32 maeder biblio: synchronisation and concurrency in processes; ak; bhibbard grecommended91; classes; computer programming; concurrency; conditional critical regions; coroutines; CR categories: 4.20; CSP; data representations; Dijkstra's guarded command; guarded commands; hcc; input; iterative arrays; k-concurrency; k-csp; k-guarded-commands; monitors; multiple entries; multiple exits; nondeterminacy; output; parallel composition; parallel programming; primitives; procedures; program; program structures; programming; Programming; programming languages; programming primitives; recursion; sequential processes; structured programming; structuring method", 23730 treatment = "T Theoretical or Mathematical", 23731} 23732 23733@Article{Brice:1978:FCR, 23734 author = "Richard S. Brice and J. C. Browne", 23735 title = "Feedback Coupled Resource Allocation Policies in the Multiprogramming-Multiprocessor Computer System", 23736 journal = j-CACM, 23737 volume = "21", 23738 number = "8", 23739 pages = "678--686", 23740 month = aug, 23741 year = "1978", 23742 CODEN = "CACMA2", 23743 ISSN = "0001-0782", 23744 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23745 bibsource = "Compendex database", 23746 abstract = "Model studies of some integrated, feedback-driven scheduling systems for multiprogrammed-multiprocessor computer systems are presented. The basic control variables used are the data-flow rates for the processes executing on the CPU. The model systems feature simulated continuous-flow and preempt-resume scheduling of input-output activity. Attention is given to the amount of memory resource required for effective processing of the I/O activity (buffer space assignment). The model studies used both distribution-driven and trace-driven techniques. Even relatively simple dynamic schedulers are shown to improve system performance (as measured by user CPU time) over that given by optimal or near-optimal static schedulers imbedded in identical system structures and workload environments. The improvement is greatest under a heavy I/O demand workload.", 23747 acknowledgement = ack-nhfb, 23748 classcodes = "C6150J (Operating systems)", 23749 classification = "722; 723", 23750 corpsource = "George Washington Univ., Washington, DC, USA", 23751 journalabr = "Commun ACM", 23752 keywords = "buffer space assignment; computer systems programming; computer systems, digital; dynamic schedulers; feedback scheduling; I/O activity; multiprogramming; scheduling; scheduling systems", 23753 treatment = "T Theoretical or Mathematical", 23754} 23755 23756@Article{Scheuermann:1978:SAP, 23757 author = "Peter Scheuermann and C. Robert Carlson", 23758 title = "Self-Assessment Procedure {V}: a self-assessment procedure dealing with database systems", 23759 journal = j-CACM, 23760 volume = "21", 23761 number = "8", 23762 pages = "687--693", 23763 month = aug, 23764 year = "1978", 23765 CODEN = "CACMA2", 23766 ISSN = "0001-0782", 23767 bibdate = "Sat Jan 18 15:40:45 1997", 23768 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 23769} 23770 23771@Article{Harris:1978:AUS, 23772 author = "R. A. Harris and J. D. Zund", 23773 title = "An algorithm using symbolic techniques for the {Bel-Petrov} classification of gravitational fields", 23774 journal = j-CACM, 23775 volume = "21", 23776 number = "9", 23777 pages = "715--717", 23778 month = sep, 23779 year = "1978", 23780 CODEN = "CACMA2", 23781 ISSN = "0001-0782", 23782 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23783 acknowledgement = ack-nhfb, 23784 classcodes = "A0270 (Computational techniques); A0420C (Fundamental problems and general formalism in general relativity); A0430 (Gravitational waves and radiation: theory); C6130 (Data handling techniques); C7320 (Physics and chemistry computing)", 23785 corpsource = "HRB-Singer Inc., State College, PA, USA", 23786 keywords = "Bel; classification scheme; FORMAC; general relativity; gravitation; gravitational fields; gravitational waves; Petrov types; physics computing; symbol manipulation", 23787 treatment = "A Application; T Theoretical or Mathematical", 23788} 23789 23790@Article{Schwetman:1978:HSM, 23791 author = "H. D. Schwetman", 23792 title = "Hybrid Simulation Models of Computer Systems", 23793 journal = j-CACM, 23794 volume = "21", 23795 number = "9", 23796 pages = "718--723", 23797 month = sep, 23798 year = "1978", 23799 CODEN = "CACMA2", 23800 ISSN = "0001-0782", 23801 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23802 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/simulan.bib", 23803 abstract = "A description is given of the structure and operation of a hybrid simulation model in which both discrete-event simulation and analytic techniques are combined to produce efficient yet accurate system models. In an example based on a simple hypothetical computer system, discrete-event simulation is used to model the arrival and activation of jobs, and a central-server queueing network models the use of system processors. The accuracy and efficiency of the hybrid technique are demonstrated by comparing the result and computational costs of the hybrid model of the example with those of an equivalent simulation-only model.", 23804 acknowledgement = ack-nhfb, 23805 classcodes = "C7430 (Computer engineering)", 23806 classification = "722; 723", 23807 corpsource = "Purdue Univ., Lafayette, IN, USA", 23808 journalabr = "Commun ACM", 23809 keywords = "activation of jobs; analytic techniques; arrival; central server queueing; computer selection and evaluation; computer simulation; computer systems; computer systems, digital; digital simulation; discrete event; hypothetical computer; network; simulation; simulation model; system", 23810 treatment = "A Application; T Theoretical or Mathematical", 23811} 23812 23813@Article{Barth:1978:PID, 23814 author = "Jeffrey M. Barth", 23815 title = "A Practical Interprocedural Data Flow Analysis Algorithm", 23816 journal = j-CACM, 23817 volume = "21", 23818 number = "9", 23819 pages = "724--736", 23820 month = sep, 23821 year = "1978", 23822 CODEN = "CACMA2", 23823 ISSN = "0001-0782", 23824 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23825 bibsource = "Compendex database", 23826 abstract = "A new interprocedural data flow analysis algorithm is presented and analyzed. The algorithm associates with each procedure in a program information about which variables may be modified, which may be used, and which are possibly preserved by a call on the procedure, and all of its subcalls. The algorithm is sufficiently powerful to be used on recursive programs and to deal with the sharing of variables which arises through reference parameters. The algorithm is unique in that it can compute all of this information in a single pass, not requiring a prepass to compute calling relationships or sharing patterns. The algorithm is asymptotically optimal in time complexity. It has been implemented and is practical even on programs which are quite large.", 23827 acknowledgement = ack-nhfb, 23828 classcodes = "C4240 (Programming and algorithm theory)", 23829 classification = "723", 23830 corpsource = "Stanford Univ., Stanford, CA, USA", 23831 journalabr = "Commun ACM", 23832 keywords = "asymptotically; computer programming; interprocedural data flow analysis algorithm; optimal in time complexity; program; programming theory; recursive programs; reference parameters", 23833 treatment = "T Theoretical or Mathematical", 23834} 23835 23836@Article{Popek:1978:MVD, 23837 author = "Gerald J. Popek and David A. Farber", 23838 title = "Model for Verification of Data Security in Operating Systems", 23839 journal = j-CACM, 23840 volume = "21", 23841 number = "9", 23842 pages = "737--749", 23843 month = sep, 23844 year = "1978", 23845 CODEN = "CACMA2", 23846 ISSN = "0001-0782", 23847 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23848 bibsource = "Compendex database", 23849 abstract = "Program verification applied to kernel architectures forms a promising method for providing uncircumventably secure, shared computer systems. A precise definition of data security is developed in terms of a general model for operating systems. This model is suitable as a basis for verifying many of those properties of an operating system which are necessary to assure reliable enforcement of security. The application of this approach to the UCLA secure operating system is also discussed.", 23850 acknowledgement = ack-nhfb, 23851 classcodes = "C6150J (Operating systems)", 23852 classification = "722; 723", 23853 corpsource = "Univ. of California, Los Angeles, CA, USA", 23854 journalabr = "Commun ACM", 23855 keywords = "computer operating systems; computer systems, digital --- Time Sharing; data processing; data security; kernel architectures; model; operating systems; operating systems (computers); security of data; verification", 23856 treatment = "P Practical", 23857} 23858 23859@Article{Denning:1978:GWS, 23860 author = "Peter J. Denning and Donald R. Slutz", 23861 title = "Generalized Working Sets for Segment Reference Strings", 23862 journal = j-CACM, 23863 volume = "21", 23864 number = "9", 23865 pages = "750--759", 23866 month = sep, 23867 year = "1978", 23868 CODEN = "CACMA2", 23869 ISSN = "0001-0782", 23870 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23871 bibsource = "Compendex database", 23872 abstract = "The working-set concept is extended for programs that reference segments of different sizes. The generalized working-set policy (GWS) keeps as its resident set those segments whose retention costs do not exceed their retrieval costs. The GWS is a model for the entire class of demand-fetching memory policies that satisfy a resident-set inclusion property. A generalized optimal policy (GOPT) is also defined; at its operating points it minimizes aggregated retention and swapping costs. Special cases of the cost structure allow GWS and GOPT to simulate any known stack algorithm, the working set, and VMIN. Efficient procedures for computing demand curves showing swapping load as a function of memory usage are developed for GWS and GOPT policies. Empirical data from an actual system are included.", 23873 acknowledgement = ack-nhfb, 23874 classcodes = "C6120 (File organisation)", 23875 classification = "723", 23876 corpsource = "Purdue Univ., Lafayette, IN, USA", 23877 journalabr = "Commun ACM", 23878 keywords = "computer operating systems; demand fetching memory policies; generalised optimal policy; generalised working set policy; operating systems (computers); property; resident set inclusion; retention costs; retrieval costs; segment reference strings; storage; storage management; swapping costs; virtual", 23879 treatment = "T Theoretical or Mathematical", 23880 xxtitle = "Generalized working sets of segment reference strings", 23881} 23882 23883@Article{Myers:1978:CEP, 23884 author = "Glenford J. Myers", 23885 title = "Controlled Experiment in Program Testing and Code Walkthroughs\slash Inspections", 23886 journal = j-CACM, 23887 volume = "21", 23888 number = "9", 23889 pages = "760--768", 23890 month = sep, 23891 year = "1978", 23892 CODEN = "CACMA2", 23893 ISSN = "0001-0782", 23894 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23895 bibsource = "Compendex database", 23896 abstract = "An experiment in program testing is described that employs 59 highly experienced data processing professionals using seven methods to test a small PL/I program. The results show that the popular code walkthrough\slash inspection method was as effective as other computer-based methods in finding errors and that the most effective methods (in terms of errors found and cost) employed pairs of subjects who tested the program independently and then pooled their findings. The study also shows that there is a tremendous amount of variability among subjects and that the ability to detect certain types of errors varies from method to method.", 23897 acknowledgement = ack-nhfb, 23898 classcodes = "C6110 (Systems analysis and programming); C6150G (Diagnostic, testing, debugging and evaluating systems)", 23899 classification = "723", 23900 corpsource = "IBM Systems Res. Inst., Palo Alto, CA, USA", 23901 journalabr = "Commun ACM", 23902 keywords = "code; computer programming; controlled experiment; effective; errors; experienced data processing; of subjects; pairs; professionals; program debugging; program testing; small PL/I program; variability; walkthroughs/inspections", 23903 treatment = "P Practical; X Experimental", 23904} 23905 23906@Article{Ottmann:1978:RBT, 23907 author = "Th. Ottmann and H. W. Six and D. Wood", 23908 title = "Right Brother Trees", 23909 journal = j-CACM, 23910 volume = "21", 23911 number = "9", 23912 pages = "769--776", 23913 month = sep, 23914 year = "1978", 23915 CODEN = "CACMA2", 23916 ISSN = "0001-0782", 23917 MRclass = "68A10", 23918 MRnumber = "58 13898", 23919 mrreviewer = "Stephen Soule", 23920 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23921 acknowledgement = ack-nhfb, 23922 classcodes = "C1160 (Combinatorial mathematics); C6120 (File organisation)", 23923 corpsource = "Univ. of Karlsruhe, Karlsruhe, West Germany", 23924 keywords = "balanced trees; data structures; deletion algorithms; file organisation; insertion algorithm; one sided height; right brother trees; trees (mathematics)", 23925 treatment = "T Theoretical or Mathematical", 23926} 23927 23928@Article{Ulrich:1978:EMD, 23929 author = "Ernst G. Ulrich", 23930 title = "Event Manipulation for Discrete Simulations Requiring Large Numbers of Events", 23931 journal = j-CACM, 23932 volume = "21", 23933 number = "9", 23934 pages = "777--785", 23935 month = sep, 23936 year = "1978", 23937 CODEN = "CACMA2", 23938 ISSN = "0001-0782", 23939 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23940 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD.bib", 23941 abstract = "An event-manipulation system is presented consisting of two parts. The first part addresses the familiar problem of event scheduling efficiency when the number of scheduled events grows large. The second part deals with the less apparent problem of providing efficiency and flexibility as scheduled events are accessed to be executed. Additional features and problems dealt with include the proper handling of simultaneous events; that certain events must be created, scheduled, and executed at the same points in simulated time; that infinite loops caused by the concatenation of such ``zero-time'' events are possible and must be diagnosed; that maintaining various event counts is practical and economical; and that a capability for handling ``time-displaceable'' events is desirable and possible.", 23942 acknowledgement = ack-nhfb, 23943 classcodes = "C1290 (Applications of systems theory)", 23944 classification = "723; 912", 23945 corpsource = "Digital Equipment Corp., Maynard, MA, USA", 23946 country = "USA", 23947 descriptors = "Simulation; event set;", 23948 enum = "7988", 23949 journalabr = "Commun ACM", 23950 keywords = "computer programming --- Subroutines; digital simulation; discrete simulations; event; event scheduling efficiency; large numbers of events; manipulation system; operations research; scheduling; scheduling algorithms; simultaneous events; time flow mechanisms", 23951 language = "English", 23952 location = "SEL: Wi", 23953 references = "0", 23954 revision = "16/01/94", 23955 treatment = "T Theoretical or Mathematical", 23956} 23957 23958@Article{Maly:1978:NVM, 23959 author = "K. Maly", 23960 title = "A note on virtual memory indexes", 23961 journal = j-CACM, 23962 volume = "21", 23963 number = "9", 23964 pages = "786--787", 23965 month = sep, 23966 year = "1978", 23967 CODEN = "CACMA2", 23968 ISSN = "0001-0782", 23969 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23970 acknowledgement = ack-nhfb, 23971 classcodes = "C6120 (File organisation)", 23972 corpsource = "Univ. of Minnesota, Minneapolis, MN, USA", 23973 keywords = "construction; linked; maintenance; representation; retrieval cost; virtual memory indexes; virtual storage; within a page", 23974 treatment = "T Theoretical or Mathematical", 23975} 23976 23977@Article{Ward:1978:RTP, 23978 author = "Stephen A. Ward", 23979 title = "Real Time Plotting of Approximate Contour Maps", 23980 journal = j-CACM, 23981 volume = "21", 23982 number = "9", 23983 pages = "788--790", 23984 month = sep, 23985 year = "1978", 23986 CODEN = "CACMA2", 23987 ISSN = "0001-0782", 23988 bibdate = "Tue Mar 25 13:26:09 MST 1997", 23989 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/78.bib", 23990 abstract = "For output to a character-oriented device, it is generally preferable to plot a contour map in raster-scan order (rather than to follow individual contour lines). A technique is described for the production of crude contour maps on a serial character-oriented device. The method described runs in real time in the sense that the computation required per output character is constant. While the contours produced exhibit local inaccuracies, they retain the properties of not crossing and of forming closed curves (except where they intersect the boundaries of the map).", 23991 acknowledgement = ack-nhfb, 23992 classcodes = "C6130B (Graphics techniques); C7340 (Geophysics computing)", 23993 classification = "405; 723", 23994 corpsource = "MIT, Cambridge, MA, USA", 23995 journalabr = "Commun ACM", 23996 keywords = "approximate contour maps; cartography; computer graphics; contour maps; contour output; geophysics computing; maps and mapping; oriented device; plotting; real time; serial character", 23997 treatment = "A Application; P Practical", 23998} 23999 24000@Article{Tenenbaum:1978:SDS, 24001 author = "A. Tenenbaum", 24002 title = "Simulations of dynamic sequential search algorithms", 24003 journal = j-CACM, 24004 volume = "21", 24005 number = "9", 24006 pages = "790--791", 24007 month = sep, 24008 year = "1978", 24009 CODEN = "CACMA2", 24010 ISSN = "0001-0782", 24011 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24012 acknowledgement = ack-nhfb, 24013 classcodes = "C6130 (Data handling techniques)", 24014 corpsource = "Brooklyn Coll., New York, NY, USA", 24015 keywords = "dynamic reordering; dynamic sequential search algorithms; list; list processing; processing; simulation", 24016 treatment = "T Theoretical or Mathematical", 24017} 24018 24019@Article{Brainerd:1978:F, 24020 author = "Walt Brainerd", 24021 title = "{Fortran 77}", 24022 journal = j-CACM, 24023 volume = "21", 24024 number = "10", 24025 pages = "806--820", 24026 month = oct, 24027 year = "1978", 24028 CODEN = "CACMA2", 24029 ISSN = "0001-0782", 24030 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24031 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 24032 abstract = "A compiler for Fortran 77 may be larger than one for the 1966 standard Fortran, but not much larger than most current compilers. The compilation should be almost as efficient as before and the code produced should be almost as efficient, except possible for some of the new features such as the character data type and some of the new types of input\slash output. In several cases, such as DO loops (due to deletion of extended range) and IF blocks, it should be possible to generate even more efficient code than before. Furthermore the modest but powerful language extensions should serve to reduce greatly the costs of developing, maintaining, and transporting Fortran software.", 24033 acknowledgement = ack-nhfb, 24034 annote = "I-O and OPEN statements.", 24035 classcodes = "C6140D (High level languages)", 24036 classification = "723", 24037 corpsource = "Burroughs Corp., Encino, CA, USA", 24038 journalabr = "Commun ACM", 24039 keywords = "computer programming languages; FORTRAN; FORTRAN 77; standard FORTRAN; standards", 24040 treatment = "G General Review; N New Development", 24041} 24042 24043@Article{Towsley:1978:MPP, 24044 author = "D. Towsley and K. M. Chandy and J. C. Browne", 24045 title = "Models for Parallel Processing Within Programs: Application to {CPU:I/O} and {I/O:I/O} Overlap", 24046 journal = j-CACM, 24047 volume = "21", 24048 number = "10", 24049 pages = "821--831", 24050 month = oct, 24051 year = "1978", 24052 CODEN = "CACMA2", 24053 ISSN = "0001-0782", 24054 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24055 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib and ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Parallel.io.bib", 24056 abstract = "Approximate queueing models for internal parallel processing by individual programs in a multiprogrammed system are developed. The solution technique is developed by network decomposition. The models are formulated in terms of CPU:I/O and I/O:I/O overlap and applied to the analysis of these problems. The percentage performance improvement from CPU:I/O overlap is found to be greatest for systems which are in approximate CPU:I/O utilization balance and for low degrees of multiprogramming. The percentage improvement from I/O:I/O overlap is found to be greatest for systems in which the I/O system is more utilized than the CPU.", 24057 acknowledgement = ack-nhfb, 24058 annote = "Queueing models for parallel processing by improvement from CPU:I/O overlap if found to be greatest for systems which are in CPU:I/O balance and for low degrees of multiprogramming. Improvement from I/O:I/O overlap is found to be greatest for systems in which the I/O system is more utilized than the CPU.", 24059 classcodes = "C1140C (Queueing theory); C6150J (Operating systems)", 24060 classification = "722; 723", 24061 comment = "Models CPU:I/O and I/O:I/O overlap within a program. ``Overlapping is helpful only when it allows a device to be utilized which would not be utilized without overlapping.'' In general the overlapping seems to help.", 24062 corpsource = "Univ. of Texas, Austin, TX, USA", 24063 journalabr = "Commun ACM", 24064 keywords = "computer systems programming; computer systems, digital --- Multiprocessing; internal parallel; network decomposition; parallel I/O; parallel processing; pario bib; processing; queueing models; queueing theory", 24065 treatment = "T Theoretical or Mathematical", 24066} 24067 24068@Article{Shneiderman:1978:JSF, 24069 author = "Ben Shneiderman", 24070 title = "Jump Searching: {A} Fast Sequential Search Technique", 24071 journal = j-CACM, 24072 volume = "21", 24073 number = "10", 24074 pages = "831--834", 24075 month = oct, 24076 year = "1978", 24077 CODEN = "CACMA2", 24078 ISSN = "0001-0782", 24079 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24080 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 24081 abstract = "When sequential file structures must be used and binary searching is not feasible, jump searching becomes an appealing alternative. An exploration is made of variants of the classic jump searching scheme where the optimum jump size is the square root of the number of records. Multiple level and variable size jump strategies are explored, appropriate applications are discussed and performance is evaluated.", 24082 acknowledgement = ack-nhfb, 24083 annote = "Explores variants of the classic jump searching scheme where the optimum jump size is the square root of the number of records.", 24084 classcodes = "C6120 (File organisation)", 24085 classification = "723", 24086 corpsource = "Univ. of Maryland, College Park, MD, USA", 24087 journalabr = "Commun ACM", 24088 keywords = "computer systems programming; data structures; database structures; file management; file organisation; index searching; jump searching; Jump searching; jump strategies; search strategies; sequential file structures; sequential files; sequential search technique", 24089 treatment = "G General Review", 24090} 24091 24092@Article{Chang:1978:OHM, 24093 author = "Shi-Kuo Chang and Yin-Wah Wong", 24094 title = "Optimal Histogram Matching by Monotone Gray Level Transformation", 24095 journal = j-CACM, 24096 volume = "21", 24097 number = "10", 24098 pages = "835--840", 24099 month = oct, 24100 year = "1978", 24101 CODEN = "CACMA2", 24102 ISSN = "0001-0782", 24103 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24104 bibsource = "Compendex database", 24105 abstract = "Investigation of the problem of optimal histogram matching using monotone gray level transformation, which always assigns all picture points of a given gray level i to another gray level T(i) such that if i greater than equivalent to j, then T(i) greater than equivalent to T(j). The objective is to find a transformed digital picture of a given picture such that the sum of absolute errors between the gray level histogram of the transformed picture and that of a reference picture is minimized. This is equivalent to placing k1 linearly ordered objects of different sizes one by one into k2 linearly ordered boxes of assorted sizes, such that the accumulated error of space underpacked or overpacked in the boxes is minimized; the placement function is monotonic, which ensures a polynomial time solution to this problem. A tree search algorithm for optimal histogram matching is presented which has time complexity O(k1 multiplied by k2). If the monotone property is dropped, then the problem becomes NP-complete, even if it is restricted to k2 equals 2.", 24106 acknowledgement = ack-nhfb, 24107 classcodes = "C1260 (Information theory)", 24108 classification = "723; 741", 24109 corpsource = "Univ. of Illinois at Chicago Circle, Chicago, IL, USA", 24110 journalabr = "Commun ACM", 24111 keywords = "algorithm; complete computer programs; computer systems programming; computerised picture processing; histogram matching; image processing; optimal histogram matching; tree search", 24112 treatment = "T Theoretical or Mathematical", 24113} 24114 24115@Article{Morris:1978:CLN, 24116 author = "Robert Morris", 24117 title = "Counting Large Numbers of Events in Small Registers", 24118 journal = j-CACM, 24119 volume = "21", 24120 number = "10", 24121 pages = "840--842", 24122 month = oct, 24123 year = "1978", 24124 CODEN = "CACMA2", 24125 ISSN = "0001-0782", 24126 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24127 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/bin-packing.bib", 24128 abstract = "It is possible to use a small counter to keep approximate counts of large numbers. The resulting expected error can be rather precisely controlled. An example is given in which 8-bit counters (bytes) are used to keep track of as many as 130,000 events with a relative error which is substantially independent of the number n of events. This relative error can be expected to be 24 percent or less 95 percent of the time. The techniques could be used to advantage in multichannel counting hardware or software used for the monitoring of experiments or processes.", 24129 acknowledgement = ack-nhfb, 24130 classcodes = "C6130 (Data handling techniques)", 24131 classification = "723", 24132 corpsource = "Bell Labs., Murray Hill, NJ, USA", 24133 journalabr = "Commun ACM", 24134 keywords = "computer systems programming; counting; data handling; multichannel counting hardware", 24135 treatment = "G General Review", 24136} 24137 24138@Article{McMaster:1978:AAD, 24139 author = "Colin L. McMaster", 24140 title = "An Analysis of Algorithms for the {Dutch National Flag Problem}", 24141 journal = j-CACM, 24142 volume = "21", 24143 number = "10", 24144 pages = "842--846", 24145 month = oct, 24146 year = "1978", 24147 CODEN = "CACMA2", 24148 ISSN = "0001-0782", 24149 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24150 note = "See corrigendum \cite{McMaster:1979:CAA}.", 24151 abstract = "Solutions to the Dutch National Flag Problem have been given by Dijkstra [1] and Meyer [3]. \par Dijkstra starts with a simple program and arrives at an improved program by refinement. Both of the algorithms given by Dijkstra are shown to have an expected number of swaps which is $2/3N + O(1)$ and that these values differ at most by $1/3$ of a swap and asymptotically by $1/4$ of a swap. The algorithm of Meyer is shown to have expected swap complexity$ 5/9N$.", 24152 acknowledgement = ack-nhfb, 24153 classcodes = "C6110 (Systems analysis and programming)", 24154 corpsource = "Univ. of California, Berkeley, CA, USA", 24155 keywords = "Algorithmic analysis; algorithmic analysis; complete computer programs; Dutch National Flag Problem; program refinement; programming; refinement; structured programming", 24156 treatment = "T Theoretical or Mathematical", 24157} 24158 24159@Article{Sedgewick:1978:IQP, 24160 author = "Robert Sedgewick", 24161 title = "Implementing {Quicksort} Programs", 24162 journal = j-CACM, 24163 volume = "21", 24164 number = "10", 24165 pages = "847--857", 24166 month = oct, 24167 year = "1978", 24168 CODEN = "CACMA2", 24169 ISSN = "0001-0782", 24170 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24171 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 24172 note = "See corrigendum \cite{Sedgewick:1979:CIQ}.", 24173 abstract = "This paper is a practical study of how to implement the Quicksort sorting algorithm and its best variants on real computers, including how to apply various code optimization techniques. A detailed implementation combining the most effective improvements to Quicksort is given, along with a discussion of how to implement it in assembly language. Analytic results describing the performance of the programs are summarized. A variety of special situations are considered from a practical standpoint to illustrate Quicksort's wide applicability as an internal sorting method which requires negligible extra storage.", 24174 acknowledgement = ack-nhfb, 24175 classcodes = "C6130 (Data handling techniques)", 24176 classification = "723", 24177 corpsource = "Brown Univ., Providence, RI, USA", 24178 journalabr = "Commun ACM", 24179 keywords = "analysis of algorithms; code optimisation techniques; code optimization; computer systems programming; internal; Quicksort; Quicksort programs; sorting; sorting algorithm; sorting method", 24180 treatment = "G General Review", 24181} 24182 24183@Article{Lyon:1978:PST, 24184 author = "Gordon Lyon", 24185 title = "Packed Scatter Tables", 24186 journal = j-CACM, 24187 volume = "21", 24188 number = "10", 24189 pages = "857--865", 24190 month = oct, 24191 year = "1978", 24192 CODEN = "CACMA2", 24193 ISSN = "0001-0782", 24194 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24195 bibsource = "Compendex database", 24196 abstract = "Scatter tables for open addressing benefit from recursive entry displacements, cutoffs for unsuccessful searches, and auxiliary cost functions. Compared with conventional methods, the new techniques provide substantially improved tables that resemble exact-solution optimal packings. The displacements are depth-limited approximations to an enumerative (exhaustive) optimization, although packing costs remain linear --- O(n) --- with table size n. The techniques are primarily suited for important fixed (but possibly quite large) tables for which reference frequencies may be known: op-code tables, spelling dictionaries, access arrays. Introduction of frequency weights further improves retrievals, but the enhancement may degrade cutoffs.", 24197 acknowledgement = ack-nhfb, 24198 classcodes = "C6130 (Data handling techniques)", 24199 classification = "723", 24200 corpsource = "Nat. Bur. of Stand., Washington, DC, USA", 24201 journalabr = "Commun ACM", 24202 keywords = "computer systems programming; costs; data handling; open addressing; optimal packings; packed scatter tables; packing; recursion; reference frequencies; scatter tables", 24203 treatment = "G General Review", 24204} 24205 24206@Article{Easton:1978:CSV, 24207 author = "Malcolm C. Easton and Ronald Fagin", 24208 title = "Cold-Start Vs. Warm-Start Miss Ratios", 24209 journal = j-CACM, 24210 volume = "21", 24211 number = "10", 24212 pages = "866--872", 24213 month = oct, 24214 year = "1978", 24215 CODEN = "CACMA2", 24216 ISSN = "0001-0782", 24217 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24218 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/storage.bib", 24219 abstract = "In a two-level computer storage hierarchy, miss ratio measurements are often made from a ``cold start'', that is, made with the first-level store initially empty. For large capacities the effect on the measured miss ratio of the misses incurred while filling the first-level store can be significant, even for long reference strings. Use of ``warm-start'' rather than ``cold-start'' miss ratios cast doubt on the widespread belief that the observed ``S-shape'' of lifetime (reciprocal of miss ratio) versus capacity curve indicates a property of behavior of programs that maintain a constant number of pages in main storage. It is shown how to obtain, under simple assumptions, the cache miss ratio for multiprogramming from cold-start miss ratio values and how to obtain approximate cold-start miss ratios from warm-start miss ratios.", 24220 acknowledgement = ack-nhfb, 24221 classcodes = "C6150J (Operating systems)", 24222 classification = "723", 24223 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 24224 journalabr = "Commun ACM", 24225 keywords = "computer operating systems; computer systems programming --- Multiprogramming; memory hierarchy; Performance Evaluation: Analytic", 24226 keywords = "cache miss ratio; cold start; hierarchy; lifetime; lifetime function; miss ratios; multiprogramming; operating systems (computers); storage; warm start", 24227 treatment = "G General Review", 24228} 24229 24230@Article{Franta:1978:CHT, 24231 author = "W. R. Franta and Kurt Maly", 24232 title = "A comparison of heaps and the {TL} structure for the simulation event set", 24233 journal = j-CACM, 24234 volume = "21", 24235 number = "10", 24236 pages = "873--875", 24237 month = oct, 24238 year = "1978", 24239 CODEN = "CACMA2", 24240 ISSN = "0001-0782", 24241 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24242 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib", 24243 acknowledgement = ack-nhfb, 24244 classcodes = "C1290 (Applications of systems theory); C6130 (Data handling techniques)", 24245 corpsource = "Univ. of Minnesota, Minneapolis, MN, USA", 24246 country = "USA", 24247 descriptors = "Simulation;", 24248 enum = "1005", 24249 keywords = "data handling; event set; heaps; operations research; Simulation; simulation event set; TL structure", 24250 language = "English", 24251 references = "0", 24252 treatment = "G General Review", 24253} 24254 24255@Article{Lyons:1978:SDE, 24256 author = "Norman R. Lyons", 24257 title = "Systems Design Education: a Gaming Approach", 24258 journal = j-CACM, 24259 volume = "21", 24260 number = "11", 24261 pages = "889--895", 24262 month = nov, 24263 year = "1978", 24264 CODEN = "CACMA2", 24265 ISSN = "0001-0782", 24266 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24267 bibsource = "Compendex database", 24268 abstract = "One of the problems facing managers of computer installations is the problem of configuring the computer system to meet the demands made by the mix of jobs that the computer center must service. A management game is presented that allows the player to configure a computer system to meet a hypothetical job mix. The job mix is under the control of a game administrator and can be varied to simulate a variety of real-world situations (I/O bound jobs, compute bound jobs, etc. ). The player of the game receives a set of detailed reports on the cost of his choices and a simulated run of the center operating under his choices.", 24269 acknowledgement = ack-nhfb, 24270 classcodes = "C0220 (Computing education and training); C0310 (EDP management)", 24271 classification = "722; 723; 912", 24272 corpsource = "Texas Tech. Univ., Lubbock, TX, USA", 24273 journalabr = "Commun ACM", 24274 keywords = "computer installation; computer installation management; computer installations; computer science education; computer systems, digital; configuring the computer system; cost; DP; management; management game; mix; of jobs", 24275 treatment = "A Application; T Theoretical or Mathematical", 24276} 24277 24278@Article{Wendorf:1978:SEM, 24279 author = "J. W. Wendorf", 24280 title = "A Simply Extended and Modified Batch Environment Graphical System (Sembegs)", 24281 journal = j-CACM, 24282 volume = "21", 24283 number = "11", 24284 pages = "897--904", 24285 month = nov, 24286 year = "1978", 24287 CODEN = "CACMA2", 24288 ISSN = "0001-0782", 24289 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24290 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.78.bib", 24291 abstract = "SEMBEGS is a complete batch environment graphical system containing components for handling graphical data files, for displaying the contents files on a variety of graphical hardware, and for performing graphical batch input operations. SEMBERG is easy to extend and modify to meet the growing needs of a large batch environment, and is even extendable to a fully interactive system. The paper presents the conceptual view of graphics leading to the design of SEMBEGS and outlines the major components of the system. The design of SEMBEGS is founded upon the basic assumption that the true aim of computer graphics is to describe graphical entities, rather than, as commonly held, to provide graphical input and output functional capabilities. SEMBEGS is built around a Basic Graphical Data Management System (BAGDAMS) which provides a common means of communicating the descriptions of graphical entities between the various components of SEMBEGS. BAGDAMS provides facilities for storing, retrieving, and manipulating the descriptions of graphical entities provided by, and received by application programs, graphics packages, and graphical devices.", 24292 acknowledgement = ack-nhfb, 24293 classcodes = "C6130B (Graphics techniques); C6150E (General utility programs)", 24294 classification = "723", 24295 corpsource = "Univ. of Waterloo, Waterloo, Ont., Canada", 24296 journalabr = "Commun ACM", 24297 keywords = "BAGDAMS; Basic Graphical Data; batch; batch environment; batch processing (computers); computer graphics; displaying; extend; files; fully interactive system; graphical batch input operations; graphical data; graphical system; Management System; modify; SEMBEGS", 24298 treatment = "P Practical", 24299} 24300 24301@Article{Kumar:1978:PEH, 24302 author = "B. Kumar and E. S. Davidson", 24303 title = "Performance Evaluation of Highly Concurrent Computers by Deterministic Simulation", 24304 journal = j-CACM, 24305 volume = "21", 24306 number = "11", 24307 pages = "904--913", 24308 month = nov, 24309 year = "1978", 24310 CODEN = "CACMA2", 24311 ISSN = "0001-0782", 24312 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24313 bibsource = "Compendex database", 24314 abstract = "Simulation is presented as a practical technique for performance evaluation of alternative configurations of highly concurrent computers. A technique is described for constructing a detailed deterministic simulation model of a system. In the model a control stream replaces the instruction and data streams of the real system. Simulation of the system model yields the timing resource usage statistics needed for performance evaluation, without the necessity of emulating the system. As a case study, the implementation of a simulation of a model of the CPU-memory subsystem of the IBM 360\slash 191 is described. The results of evaluating some alternative system designs are discussed. The experiments reveal that, for the case study, the major bottlenecks in the system are the memory unit and the fixed point unit. Further, it appears that many of the sophisticated pipelining and buffering techniques implemented in the architecture of the IBM 360\slash 91 are of little value when high-speed (cache) memory is used, as in the IBM 360\slash 195.", 24315 acknowledgement = ack-nhfb, 24316 classcodes = "C5220 (Computer architecture); C6150G (Diagnostic, testing, debugging and evaluating systems); C7430 (Computer engineering)", 24317 classification = "722; 723", 24318 corpsource = "Univ. of Illinois, Urbana, IL, USA", 24319 journalabr = "Commun ACM", 24320 keywords = "computer selection and evaluation; computer systems, digital; CPU memory subsystem; deterministic simulation; highly concurrent computers; IBM 360/91; multiprocessing systems; performance evaluation; virtual machines", 24321 treatment = "P Practical", 24322} 24323 24324@Article{Horn:1978:USI, 24325 author = "Berthold K. P. Horn and Brett L. Bachman", 24326 title = "Using Synthetic Images to Register Real Images with Surface Models", 24327 journal = j-CACM, 24328 volume = "21", 24329 number = "11", 24330 pages = "914--924", 24331 month = nov, 24332 year = "1978", 24333 CODEN = "CACMA2", 24334 ISSN = "0001-0782", 24335 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24336 bibsource = "Compendex database", 24337 abstract = "A number of image analysis tasks can benefit from registration of the image with a model of the surface being imaged. Automatic navigation using visible light or radar images requires exact alignment of such images with digital terrain models. In addition, automatic classification of terrain, using satellite imagery, requires such alignment to deal correctly with the effects of varying sun angle and surface slope. Even inspection techniques for certain industrial parts may be improved by this means. The required alignment is achieved by matching the real image with a synthetic image obtained from a surface model and known positions of the light sources. The synthetic image intensity is calculated using the reflectance map, a convenient way of describing surface reflection as a function of surface gradient. The technique is illustrated using LANDSAT images and digital terrain models.", 24338 acknowledgement = ack-nhfb, 24339 classcodes = "C6130B (Graphics techniques)", 24340 classification = "723", 24341 corpsource = "MIT, Cambridge, MA, USA", 24342 journalabr = "Commun ACM", 24343 keywords = "automatic classification of terrain; computer graphics; computerised picture processing; image processing; industrial parts; inspection techniques; real images; registration; satellite imagery; surface models; synthetic images", 24344 treatment = "A Application; T Theoretical or Mathematical", 24345} 24346 24347@Article{Tadikamalla:1978:CGGb, 24348 author = "P. R. Tadikamalla", 24349 title = "Computer Generation of Gamma Random Variables --- {II}", 24350 journal = j-CACM, 24351 volume = "21", 24352 number = "11", 24353 pages = "925--928", 24354 month = nov, 24355 year = "1978", 24356 CODEN = "CACMA2", 24357 ISSN = "0001-0782", 24358 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24359 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1978.bib", 24360 acknowledgement = ack-nhfb, 24361 classcodes = "C1140Z (Other topics in statistics); C7310 (Mathematics computing)", 24362 corpsource = "Univ. of Pittsburgh, Pittsburgh, PA, USA", 24363 country = "USA", 24364 descriptors = "RVG;", 24365 enum = "7944", 24366 keywords = "computational; computer generation; core; gamma random variables; nonintegral shape parameter; programming effort; random processes; statistics; storage requirements; times", 24367 language = "English", 24368 references = "0", 24369 treatment = "T Theoretical or Mathematical", 24370} 24371 24372@Article{Ripley:1978:SRP, 24373 author = "G. David Ripley", 24374 title = "Simple Recovery-Only Procedure for Simple Precedence Parsers", 24375 journal = j-CACM, 24376 volume = "21", 24377 number = "11", 24378 pages = "928--930", 24379 month = nov, 24380 year = "1978", 24381 CODEN = "CACMA2", 24382 ISSN = "0001-0782", 24383 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24384 bibsource = "Compendex database", 24385 abstract = "A simple method is described enabling simple precedence parsers to recover from syntax errors. No attempt to repair errors is made, yet parsing and most semantic processing can continue. The result is a good ``first approximation'' to syntax error handling with negligible increase in parsing time, space, and complexity of both the parser and its table generator.", 24386 acknowledgement = ack-nhfb, 24387 classcodes = "C4210 (Formal logic); C6150C (Compilers, interpreters and other processors); C6150G (Diagnostic, testing, debugging and evaluating systems)", 24388 classification = "723", 24389 corpsource = "RCA Labs., Princeton, NJ, USA", 24390 journalabr = "Commun ACM", 24391 keywords = "compilers; computer programming languages; debugging; grammars; processing; program compilers; program debugging; recovery; semantic; simple precedence parsers; syntax errors; system; table generator", 24392 treatment = "T Theoretical or Mathematical", 24393} 24394 24395@Article{Friedman:1978:NCE, 24396 author = "D. P. Friedman and D. S. Wise", 24397 title = "A Note on Conditional Expressions", 24398 journal = j-CACM, 24399 volume = "21", 24400 number = "11", 24401 pages = "931--933", 24402 month = nov, 24403 year = "1978", 24404 CODEN = "CACMA2", 24405 ISSN = "0001-0782", 24406 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24407 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib", 24408 abstract = "Evaluation of a conditional expression may succeed even when the ``deciding predicate'' diverges and the alternatives are records (or nodes) whose fields have different content.", 24409 acknowledgement = ack-nhfb, 24410 classcodes = "C4240 (Programming and algorithm theory); C6140D (High level languages)", 24411 corpsource = "Indiana Univ., Bloomington, IN, USA", 24412 keywords = "ambiguous function; conditional expression; conditional forms; functional; if-then-else; infinite structures; LISP; Lisp; LISP; Parallel evaluation; parallel evaluation; programming theory; suspending cons", 24413 treatment = "T Theoretical or Mathematical", 24414} 24415 24416@Article{BrinchHansen:1978:DPC, 24417 author = "Per {Brinch Hansen}", 24418 title = "Distributed Processes: {A} Concurrent Programming Concept", 24419 journal = j-CACM, 24420 volume = "21", 24421 number = "11", 24422 pages = "934--941", 24423 month = nov, 24424 year = "1978", 24425 CODEN = "CACMA2", 24426 ISSN = "0001-0782", 24427 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24428 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/os.bib and ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.synch.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 24429 abstract = "A language concept for concurrent processes without common variables is introduced. These processes communicate and synchronize by means of procedure calls and guarded regions. This concept is proposed for real-time applications controlled by microcomputer networks with distributed storage. The paper gives several examples of distributed processes and shows that they include procedures, coroutines, classes, monitors, processes, semaphores, buffers, path expressions, and input-output as special cases.", 24430 acknowledgement = ack-nhfb, 24431 annote = "Dated, but it's one of those papers that will always be referenced. This is an early paper which proposes having a Boolean guard at the start of a procedure. The procedure is not allowed to execute until the guard becomes true. This paper is also a reference for the Shortest Job Next (SJN) scheduler.", 24432 classcodes = "C4240 (Programming and algorithm theory); C6140D (High level languages)", 24433 classification = "723", 24434 corpsource = "Univ. of Southern California, Los Angeles, CA, USA", 24435 journalabr = "Commun ACM", 24436 keywords = "buffers; classes; communication; computer programming languages; concurrency; concurrent programming; coroutines; distributed; distributed processes; expressions; guarded command; guarded regions; input/output; k-boolean-guards; k-shortest-job-next; language concept; microcomputer networks; monitors; operating synchronization; parallel processing; path; path expressions; procedure calls; procedures; processes; programming theory; semaphores; storage", 24437 treatment = "T Theoretical or Mathematical", 24438} 24439 24440@Article{Luccio:1978:PT, 24441 author = "Fabrizio Luccio and Linda Pagli", 24442 title = "Power Trees", 24443 journal = j-CACM, 24444 volume = "21", 24445 number = "11", 24446 pages = "941--947", 24447 month = nov, 24448 year = "1978", 24449 CODEN = "CACMA2", 24450 ISSN = "0001-0782", 24451 MRclass = "68B10 (68C25)", 24452 MRnumber = "80a:68018", 24453 mrreviewer = "Stephen Soule", 24454 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24455 bibsource = "Compendex database", 24456 abstract = "The new class of PK trees is presented, where height balance is maintained for the nodes lying on particular paths. The number of nodes of a Pk tree asymptotically grows as a power of the height, in the worst case. A procedure for node insertion is given, and the class of trees considered is restricted to IPk trees, which are buildable by such a procedure. The average behavior of such trees, studied by an extensive set of simulation runs, is close to that of AVL trees. In particular, the family of IPO trees whose main advantage is the reduced number of restructurings required after node insertion, is analyzed.", 24457 acknowledgement = ack-nhfb, 24458 classcodes = "C1160 (Combinatorial mathematics); C4240 (Programming and algorithm theory); C6120 (File organisation)", 24459 classification = "723; 921", 24460 corpsource = "Univ. of Pisa, Pisa, Italy", 24461 journalabr = "Commun ACM", 24462 keywords = "AVL trees; binary search trees; computer metatheory; computer programming; file organisation; height balance; IP0 trees; IPk trees; mathematical techniques --- Trees; node insertion; Pk trees; power trees; trees (mathematics)", 24463 treatment = "T Theoretical or Mathematical", 24464} 24465 24466@Article{Sheil:1978:MST, 24467 author = "B. A. Sheil", 24468 title = "Median Split Trees: {A} Fast Lookup Technique for Frequently Occurring Keys", 24469 journal = j-CACM, 24470 volume = "21", 24471 number = "11", 24472 pages = "947--958", 24473 month = nov, 24474 year = "1978", 24475 CODEN = "CACMA2", 24476 ISSN = "0001-0782", 24477 MRclass = "68H05", 24478 MRnumber = "80a:68116", 24479 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24480 bibsource = "Compendex database", 24481 note = "Early work on minimal perfect hash functions.", 24482 abstract = "Split trees are a new technique for searching sets of keys with highly skewed frequency distributions. A split tree is a binary search tree each node of which contains two key values --- a node value which is a maximally frequent key in that subtree, and a split value which partitions the remaining keys (with respect to their lexical ordering) between the left and right subtrees. A median split tree (MST) uses the lexical median of a node's descendents as its split value to force the search tree to be perfectly balanced, achieving both a space efficient representation of the tree and high search speed. Unlike frequency ordered binary search trees, the cost of a successful search of an MST is log n bounded and very stable around minimal values. Further, an MST can be built for a given key ordering and set of frequencies in time n log n, as opposed to n**2 for an optimum binary search tree. A discussion of the application of MST's to dictionary lookup for English is presented, and the performance obtained is contrasted with that of other techniques.", 24483 acknowledgement = ack-nhfb, 24484 classcodes = "C1160 (Combinatorial mathematics); C4240 (Programming and algorithm theory); C6120 (File organisation)", 24485 classification = "723; 921", 24486 corpsource = "Harvard Univ., Cambridge, MA, USA", 24487 journalabr = "Commun ACM", 24488 keywords = "computer programming; fast lookup technique; file organisation; frequently occurring keys; lexical median; mathematical techniques --- Trees; median split tree; searching; trees (mathematics)", 24489 treatment = "T Theoretical or Mathematical", 24490} 24491 24492@Article{Hoare:1978:CCS, 24493 author = "C. A. R. Hoare", 24494 title = "Corrigendum: {``Communicating Sequential Processes''}", 24495 journal = j-CACM, 24496 volume = "21", 24497 number = "11", 24498 pages = "958--958", 24499 month = nov, 24500 year = "1978", 24501 CODEN = "CACMA2", 24502 ISSN = "0001-0782", 24503 bibdate = "Sat Jan 18 15:39:32 1997", 24504 note = "See \cite{Hoare:1978:CSP}.", 24505} 24506 24507@Article{Freuder:1978:SCE, 24508 author = "Eugene C. Freuder", 24509 title = "Synthesizing Constraint Expressions", 24510 journal = j-CACM, 24511 volume = "21", 24512 number = "11", 24513 pages = "958--966", 24514 month = nov, 24515 year = "1978", 24516 CODEN = "CACMA2", 24517 ISSN = "0001-0782", 24518 MRclass = "68E99", 24519 MRnumber = "80a:68074", 24520 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24521 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/lisp.bib", 24522 note = "Also published as MIT AI MEMO 370, Cambridge, MA, USA, 1976", 24523 abstract = "A constraint network representation is presented for a combinatorial search problem: finding values for a set of variables subject to a set of constraints. A theory of consistency levels in such networks is formulated, which is related to problems of backtrack tree search efficiency. An algorithm is developed that can achieve any level of consistency desired, in order to preprocess the problem for subsequent backtrack search, or to function as an alternative to backtrack search by explicitly determining all solutions.", 24524 acknowledgement = ack-nhfb, 24525 classcodes = "C1160 (Combinatorial mathematics); C4240 (Programming and algorithm theory)", 24526 classification = "723", 24527 corpsource = "Univ. of New Hampshire, Durham, NH, USA", 24528 journalabr = "Commun ACM", 24529 keywords = "combinatorial search; computer programming; constraint network representation; graph colouring; LISP; problem; programming theory; theory of consistency levels", 24530 treatment = "T Theoretical or Mathematical", 24531} 24532 24533@Article{Dijkstra:1978:FGC, 24534 author = "Edsger W. Dijkstra and Leslie Lamport and A. J. Martin and C. S. Scholten and E. F. M. Steffens", 24535 title = "On-the-Fly Garbage Collection: An Exercise in Cooperation", 24536 journal = j-CACM, 24537 volume = "21", 24538 number = "11", 24539 pages = "966--975", 24540 month = nov, 24541 year = "1978", 24542 CODEN = "CACMA2", 24543 ISSN = "0001-0782", 24544 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24545 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib and ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib and ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib and ftp://ftp.ira.uka.de/pub/bibliography/Compiler/Heaps.bib", 24546 note = "Also E. W. Dijkstra Note EWD496, June 1975.", 24547 abstract = "As an example of cooperation between sequential processes with very little mutual interference despite frequent manipulations of a large shared data space, a technique is developed which allows nearly all of the activity needed for garbage detection and collection to be performed by an additional processor operating concurrently with the processor devoted to the computation proper. Exclusion and synchronization constraints have been kept as weak as could be achieved; the severe complexities engendered by doing so are illustrated.", 24548 acknowledgement = ack-nhfb, 24549 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 24550 classification = "723", 24551 comment = "much overlooked algorithm, presented as more of a concurrency exercise than a garbage collector", 24552 corpsource = "Burroughs Corp., Al Nuenen, Netherlands", 24553 journalabr = "Commun ACM", 24554 keywords = "computer operating systems; functional garbage collection multiprocessing cooperating sequential processes minimised mutual exclusion correctness concurrency memory", 24555 keywords = "cooperation; garbage detection; multiprogramming; on the fly; sequential processes; storage management", 24556 treatment = "T Theoretical or Mathematical", 24557} 24558 24559@Article{Gries:1978:CEP, 24560 author = "David Gries", 24561 title = "Corrigendum: {``An exercise in proving parallel programs correct''}", 24562 journal = j-CACM, 24563 volume = "21", 24564 number = "12", 24565 month = dec, 24566 year = "1978", 24567 CODEN = "CACMA2", 24568 ISSN = "0001-0782", 24569 MRclass = "1048.68B10", 24570 MRnumber = "80b:68022", 24571 bibdate = "Tue Dec 26 13:35:07 1995", 24572 note = "See \cite{Gries:1977:EPP}.", 24573 acknowledgement = ack-nhfb, 24574} 24575 24576@Article{Needham:1978:UEA, 24577 author = "Roger M. Needham and Michael D. Schroeder", 24578 title = "Using Encryption for Authentication in Large Networks of Computers", 24579 journal = j-CACM, 24580 volume = "21", 24581 number = "12", 24582 pages = "993--999", 24583 month = dec, 24584 year = "1978", 24585 CODEN = "CACMA2", 24586 ISSN = "0001-0782", 24587 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24588 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 24589 abstract = "Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.", 24590 acknowledgement = ack-nhfb, 24591 classcodes = "C5620 (Computer networks and techniques); C6130 (Data handling techniques)", 24592 classification = "723", 24593 corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", 24594 journalabr = "Commun ACM", 24595 keywords = "authenticated communication; computer networks; data processing --- Security of Data; document integrity; encryption; guarantee; protocols; public key encryption algorithms; security of data; signature verification", 24596 treatment = "P Practical", 24597} 24598 24599@Article{Gries:1978:LSA, 24600 author = "David Gries and Jayadev Misra", 24601 title = "A Linear Sieve Algorithm for Finding Prime Numbers", 24602 journal = j-CACM, 24603 volume = "21", 24604 number = "12", 24605 pages = "999--1003", 24606 month = dec, 24607 year = "1978", 24608 CODEN = "CACMA2", 24609 ISSN = "0001-0782", 24610 MRclass = "10A25 (68C25)", 24611 MRnumber = "80d:10010", 24612 mrreviewer = "D. H. Lehmer", 24613 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24614 bibsource = "Compendex database", 24615 abstract = "A new algorithm is presented for finding all primes between 2 and n. The algorithm executes in time proportional to n (assuming that multiplication of integers not larger than n can be performed in unit time). The method has the same arithmetic complexity as the algorithm presented by N. G. Mairson; however, this version is perhaps simpler and more elegant. It is also easily extended to find the prime factorization of all integers between 2 and n in time proportional to n.", 24616 acknowledgement = ack-nhfb, 24617 classcodes = "C1160 (Combinatorial mathematics); C5230 (Digital arithmetic methods)", 24618 classification = "723", 24619 corpsource = "Cornell Univ., Ithaca, NY, USA", 24620 journalabr = "Commun ACM", 24621 keywords = "computer programming; linear sieve algorithm; number theory; prime factorization; prime numbers", 24622 treatment = "T Theoretical or Mathematical", 24623} 24624 24625@Article{Peterson:1978:SOT, 24626 author = "James L. Peterson and James R. Bitner and John H. Howard", 24627 title = "The Selection of Optimal Tab Settings", 24628 journal = j-CACM, 24629 volume = "21", 24630 number = "12", 24631 pages = "1004--1007", 24632 month = dec, 24633 year = "1978", 24634 CODEN = "CACMA2", 24635 ISSN = "0001-0782", 24636 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24637 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/78.bib", 24638 abstract = "A new generation of computer terminals allows tab settings to be selected and set by the computer. This feature can be used to reduce the number of characters that are needed to represent a document for transmission and printing. An algorithm is given for selecting the optimal set of tab stops for minimizing the number of characters transmitted. An implementation of the algorithm has reduced the number of characters transmitted by from 7 to 30 percent, but requires a prepass through the document to compute a matrix used in determining the optimal set of tab stops. The use of fixed tab stops, as a heuristic alternative, can achieve about 80 percent of optimal with no prepass.", 24639 acknowledgement = ack-nhfb, 24640 classcodes = "C6130D (Document processing techniques); C6130 (Data handling techniques)", 24641 classification = "723", 24642 corpsource = "Univ. of Texas, Austin, TX, USA", 24643 journalabr = "Commun ACM", 24644 keywords = "algorithm; computer programming; computer terminals; document; number; of characters; optimal tab settings; printing; selection; transmission; word processing", 24645 treatment = "P Practical", 24646} 24647 24648@Article{Wetherbe:1978:SPM, 24649 author = "James C. Wetherbe and V. Thomas Dock", 24650 title = "Strategic Planning Methodology for the Computing Effort in Higher Education: an Empirical Evaluation", 24651 journal = j-CACM, 24652 volume = "21", 24653 number = "12", 24654 pages = "1008--1015", 24655 month = dec, 24656 year = "1978", 24657 CODEN = "CACMA2", 24658 ISSN = "0001-0782", 24659 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24660 bibsource = "Compendex database", 24661 abstract = "The findings of a study designed to address the pressing problems associated with the strategic planning of the computing effort in higher education are presented here. A planning methodology was developed and tested through implementation at a university. Two years after the methodology was implemented, the effectiveness of the planning methodology was assessed in terms of the improvement of the delivery of computing services to the major institutional roles of instruction, research, and administration. Two control institutions were employed to contrast the improvements at the test institution. The results of the research indicate the planning methodology significantly enhanced the delivery of computing services.", 24662 acknowledgement = ack-nhfb, 24663 classcodes = "C0310 (EDP management); C7110 (Educational administration)", 24664 classification = "723; 901", 24665 corpsource = "Univ. of Houston, Houston, TX, USA", 24666 journalabr = "Commun ACM", 24667 keywords = "administration; computing effort; DP management; education; educational computing; higher; instruction; research; strategic planning methodology; university", 24668 treatment = "P Practical", 24669} 24670 24671@Article{Ibramsha:1978:DLE, 24672 author = "M. Ibramsha and V. Rajaraman", 24673 title = "Detection of Logical Errors in Decision Table Programs", 24674 journal = j-CACM, 24675 volume = "21", 24676 number = "12", 24677 pages = "1016--1025", 24678 month = dec, 24679 year = "1978", 24680 CODEN = "CACMA2", 24681 ISSN = "0001-0782", 24682 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24683 bibsource = "Compendex database", 24684 abstract = "An algorithm to detect logical errors in a limited-entry decision table and in loop-free programs with embedded decision tables is developed. All the conditions in the decision tables are assumed to be inequalities or equalities relating linear expressions. It is also assumed that actions in a decision table are linear in variables which occur in the condition stub of the decision table (or tables) to which control is transferred from the table. The algorithm is based on determining whether a set of linear inequalities has or does not have a solution. The algorithm is implemented in Fortran IV.", 24685 acknowledgement = ack-nhfb, 24686 classcodes = "C6150G (Diagnostic, testing, debugging and evaluating systems)", 24687 classification = "723", 24688 corpsource = "Indian Inst. of Technol., Kanpur, India", 24689 journalabr = "Commun ACM", 24690 keywords = "computer programming; decision table programs; decision tables; error diagnosis; logical errors; program diagnostics", 24691 treatment = "P Practical", 24692} 24693 24694@Article{Martelli:1978:ODT, 24695 author = "Alberto Martelli and Ugo Montanari", 24696 title = "Optimizing Decision Trees Through Heuristically Guided Search", 24697 journal = j-CACM, 24698 volume = "21", 24699 number = "12", 24700 pages = "1025--1039", 24701 month = dec, 24702 year = "1978", 24703 CODEN = "CACMA2", 24704 ISSN = "0001-0782", 24705 MRclass = "68A50", 24706 MRnumber = "58 19444", 24707 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24708 bibsource = "Compendex database", 24709 abstract = "Optimal decision table conversion has been tackled in the literature using two approaches, dynamic programming and branch-and-bound. The former technique is quite effective, but its time and space requirements are independent of how ``easy'' the given table is. Furthermore, it cannot be used to produce good, quasioptimal solutions The branch-and-bound technique uses a good heuristic to direct the search, but is cluttered up by an enormous search space, since the number of solutions increases with the number of test variables according to a double exponential. In this paper authors suggest a heuristically guided top-down search algorithm which, like dynamic programming, recognizes identical subproblems but which can be used to find both optimal and quasioptimal solutions. A heuristic search method is introduced that combines the positive aspects of the above two techniques. Compressed tables with a large number of variables can be handled without deriving expanded tables first.", 24710 acknowledgement = ack-nhfb, 24711 classcodes = "C4240 (Programming and algorithm theory)", 24712 classification = "921", 24713 corpsource = "Consiglio Nazionale delle Ricerche, Pisa, Italy", 24714 journalabr = "Commun ACM", 24715 keywords = "decision table conversion; decision tables; heuristically guided search; mathematical programming, dynamic; optimal; programming theory", 24716 treatment = "T Theoretical or Mathematical", 24717} 24718 24719@Article{Dalal:1978:RPF, 24720 author = "Yogen K. Dalal and Robert M. Metcalfe", 24721 title = "Reverse Path Forwarding of Broadcast Packets", 24722 journal = j-CACM, 24723 volume = "21", 24724 number = "12", 24725 pages = "1040--1048", 24726 month = dec, 24727 year = "1978", 24728 CODEN = "CACMA2", 24729 ISSN = "0001-0782", 24730 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24731 bibsource = "Compendex database", 24732 abstract = "A broadcast packet is for delivery to all nodes of a network. Algorithms for accomplishing this delivery through a store-and-forward packet switching computer network include (1) transmission of separately addressed packets, (2) multidestination addressing, (3) hot potato forwarding, (4) spanning tree forwarding, and (5) source based forwarding. To this list of algorithms is added (6) reverse path forwarding, a broadcast routing method which exploits routing procedures and data structures already available for packet switching. Reverse path forwarding is a practical algorithm for broadcast routing in store-and-forward packet switching computer networks. The algorithm is described as being practical because it is not optimal according to metrics developed for its analysis in this paper, and also because it can be implemented in existing networks with less complexity than that required for the known alternatives.", 24733 acknowledgement = ack-nhfb, 24734 classcodes = "C5620 (Computer networks and techniques)", 24735 classification = "723", 24736 corpsource = "Xerox Corp., Palo Alto, CA, USA", 24737 journalabr = "Commun ACM", 24738 keywords = "broadcast packets; broadcast routing; computer networks; packet switching; reverse path forwarding", 24739 treatment = "P Practical", 24740} 24741 24742@Article{Guttag:1978:ADT, 24743 author = "John V. Guttag and Ellis Horowitz and David R. Musser", 24744 title = "Abstract Data Types and Software Validation", 24745 journal = j-CACM, 24746 volume = "21", 24747 number = "12", 24748 pages = "1048--1064", 24749 month = dec, 24750 year = "1978", 24751 CODEN = "CACMA2", 24752 ISSN = "0001-0782", 24753 MRclass = "68B15", 24754 MRnumber = "80b:68030", 24755 mrreviewer = "J. Paredaens", 24756 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24757 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/Functional.bib", 24758 abstract = "A data abstraction can be naturally specified using algebraic axioms. The virtue of these axioms is that they permit a representation-independent formal specification of a data type. An example is given which shows how to employ algebraic axioms at successive levels of implementation. First, it is shown how the use of algebraic axiomatizations can simplify the process of proving the correctness of an implementation of an abstract data type. Second, semi-automatic tools are described which can be used both to automate such proofs of correctness and to derive an immediate implementation from the axioms. This implementation allows for limited testing of programs at design time, before a conventional implementation is accomplished.", 24759 acknowledgement = ack-nhfb, 24760 classcodes = "C6120 (File organisation); C6150G (Diagnostic, testing, debugging and evaluating systems)", 24761 classification = "723", 24762 corpsource = "Univ. of Southern California, Los Angeles, CA, USA", 24763 journalabr = "Commun ACM", 24764 keywords = "abstract data type; algebraic axiomatizations; algebraic axioms; computer programming languages; correctness; data abstraction; data structures; functional; program testing; software validation; testing of programs", 24765 treatment = "A Application; T Theoretical or Mathematical", 24766} 24767 24768@Article{Spitzen:1978:EHD, 24769 author = "Jay M. Spitzen and Karl N. Levitt and Lawrence Robinson", 24770 title = "An Example of Hierarchical Design and Proof", 24771 journal = j-CACM, 24772 volume = "21", 24773 number = "12", 24774 pages = "1064--1075", 24775 month = dec, 24776 year = "1978", 24777 CODEN = "CACMA2", 24778 ISSN = "0001-0782", 24779 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24780 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/semantics.bib", 24781 abstract = "Hierarchical programming is being increasingly recognized as helpful in the construction of large programs. Users of hierarchical techniques claim or predict substantial increases in productivity and in the reliability of the programs produced. In this paper we describe a formal method for hierarchical program specification, implementation, and proof. We apply this method to a significant list processing problem and also discuss a number of extensions to current programming languages that ease hierarchical program design and proof.", 24782 acknowledgement = ack-nhfb, 24783 classcodes = "C4240 (Programming and algorithm theory); C6110 (Systems analysis and programming)", 24784 classification = "723", 24785 corpsource = "SRI Internat., Menlo Park, CA, USA", 24786 journalabr = "Commun ACM", 24787 keywords = "computer programming; computer programming languages; data abstraction; hierarchical design; hierarchical program; hierarchical structures; implementation; large programs; list processing; productivity; Program verification; programming languages; proof; reliability; software modules; specification; structured programming", 24788 treatment = "A Application; T Theoretical or Mathematical", 24789} 24790 24791@Article{Bentley:1978:MDC, 24792 author = "J. L. Bentley", 24793 title = "Multidimensional Divide-and-Conquer", 24794 journal = j-CACM, 24795 volume = "23", 24796 number = "4", 24797 pages = "214--228", 24798 month = may, 24799 year = "1978", 24800 CODEN = "CACMA2", 24801 ISSN = "0001-0782", 24802 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 24803} 24804 24805@Article{Boyse:1979:IDA, 24806 author = "John W. Boyse", 24807 title = "Interference Detection Among Solids and Surfaces", 24808 journal = j-CACM, 24809 volume = "22", 24810 number = "1", 24811 pages = "3--9", 24812 month = jan, 24813 year = "1979", 24814 CODEN = "CACMA2", 24815 ISSN = "0001-0782", 24816 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24817 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.79.bib", 24818 abstract = "In many industrial environments it is necessary to determine whether there is interference among components. There are many potential interference problems in products made up of assemblies of components and in product manufacturing and testing. Typically, drawings are used in an attempt to detect such unwanted interferences, but the two-dimensional, static drafting medium does not always show interferences among three-dimensional, moving parts. A computer representation for solids and surfaces and algorithms which carry out interference checking among objects so represented are presented. Objects are represented as polyhedra or as piecewise planar surfaces. Two types of interference checking are discussed: detection of intersections among objects in fixed positions and detection of collisions among objects moving along specified trajectories.", 24819 acknowledgement = ack-nhfb, 24820 classcodes = "C6130B (Graphics techniques); C7440 (Civil and mechanical engineering computing)", 24821 classification = "723", 24822 corpsource = "Computer Sci. Dept., General Motors Res. Labs., Warren, MI, USA", 24823 journalabr = "Commun ACM", 24824 keywords = "CAD; collision detection graphics; components; computer graphics; data processing --- Manufacturing Applications; detection; drawings; industrial environments; interference; interference checking; intersection; manufacturing and testing; mechanical engineering computing; Methodologies; Modeling geometric design/modeling and Algorithmic Aspects intersection determination and solids interface detection; piecewise planar surfaces; polyhedra; potential interference problems; product; solids; surfaces; Techniques", 24825 treatment = "T Theoretical or Mathematical", 24826} 24827 24828@Article{Colton:1979:IUC, 24829 author = "Kent W. Colton", 24830 title = "The impact and use of computer technology by the police", 24831 journal = j-CACM, 24832 volume = "22", 24833 number = "1", 24834 pages = "10--20", 24835 month = jan, 24836 year = "1979", 24837 CODEN = "CACMA2", 24838 ISSN = "0001-0782", 24839 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24840 bibsource = "Compendex database", 24841 abstract = "Over the past decade there has been a significant growth in the use of computer technology by U. S. police departments. This growth, however, has been at a slower rate than predicted in the early 1970's. Further, when computer applications extend beyond ``routine'' uses to ``nonroutine'' efforts, such as resource allocation or computer-aided-dispatch systems where the machine begins to become a tool for decision making, strategic planning and person\slash machine interaction, the results of the technology to date have been mixed. Case studies and surveys are discussed which provide insights on the implementation and impact of police computer technology and the relationship of this technology to law enforcement and society.", 24842 acknowledgement = ack-nhfb, 24843 classcodes = "C7130 (Public administration)", 24844 classification = "723", 24845 corpsource = "Public Systems Evaluation, MIT, Cambridge, MA, USA", 24846 journalabr = "Commun ACM", 24847 keywords = "command and control systems; computer aided dispatch; computer technology; computers; data processing --- Governmental Applications; decision; making; person/machine interaction; police; police command and control; police data processing; resource allocation; strategic planning", 24848 treatment = "G General Review", 24849} 24850 24851@Article{Bongiovanni:1979:PDB, 24852 author = "Gian Carlo Bongiovanni and Fabrizio Luccio", 24853 title = "Permutation of Data Blocks in a Bubble Memory", 24854 journal = j-CACM, 24855 volume = "22", 24856 number = "1", 24857 pages = "21--25", 24858 month = jan, 24859 year = "1979", 24860 CODEN = "CACMA2", 24861 ISSN = "0001-0782", 24862 MRclass = "68B15", 24863 MRnumber = "80b:68026", 24864 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24865 bibsource = "Compendex database", 24866 abstract = "A common internal organization of bubble memories consists of a set of (minor) loops, connected through another (major) loop. The problem of obtaining any given permutation of the minor loop contents in minimum time is studied in this paper. A lower bound to the number of steps required by a permutation algorithm is derived, and the class of optimum algorithms is identified.", 24867 acknowledgement = ack-nhfb, 24868 classcodes = "C5320E (Storage on stationary magnetic media); C6120 (File organisation)", 24869 classification = "721; 723", 24870 corpsource = "Univ. of Pisa, Pisa, Italy", 24871 journalabr = "Commun ACM", 24872 keywords = "algorithms; bubble memory; computer programming --- Subroutines; data block shift; data blocks; data storage, magnetic; digital storage; file organisation; magnetic film stores; memory loops; optimum; permutation algorithm", 24873 treatment = "T Theoretical or Mathematical", 24874} 24875 24876@Article{Sauer:1979:IDD, 24877 author = "Charles H. Sauer and K. Mani Chandy", 24878 title = "The Impact of Distributions and Disciplines on Multiple Processor Systems", 24879 journal = j-CACM, 24880 volume = "22", 24881 number = "1", 24882 pages = "25--34", 24883 month = jan, 24884 year = "1979", 24885 CODEN = "CACMA2", 24886 ISSN = "0001-0782", 24887 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24888 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib", 24889 abstract = "Simple queueing models are used to study the performance tradeoffs of multiple processor systems. Issues considered include the impact of CPU service disciplines and distributions, level of multiprogramming, multitasking, and job priorities.", 24890 acknowledgement = ack-nhfb, 24891 annote = "(VBI-000696)", 24892 classcodes = "C5420 (Mainframes and minicomputers); C6150J (Operating systems)", 24893 classification = "722; 723", 24894 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 24895 country = "USA", 24896 descriptors = "Multiprocessor; queueing discipline;", 24897 enum = "11092", 24898 journalabr = "Commun ACM", 24899 keywords = "computer systems programming --- Multiprogramming; computer systems, digital; CPU service; job; multiple processor systems; multiprocessing systems; multiprogramming; multitasking; performance; priorities; queueing models; queueing theory; tradeoffs", 24900 language = "English", 24901 references = "0", 24902 treatment = "G General Review; T Theoretical or Mathematical", 24903} 24904 24905@Article{Banatre:1979:ECT, 24906 author = "J. P. Ban{\^a}tre and J. P. Routeau and L. Trilling", 24907 title = "An event-driven compiling technique", 24908 journal = j-CACM, 24909 volume = "22", 24910 number = "1", 24911 pages = "34--42", 24912 month = jan, 24913 year = "1979", 24914 CODEN = "CACMA2", 24915 ISSN = "0001-0782", 24916 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24917 bibsource = "Compendex database", 24918 abstract = "Due to the linear structure of source text, difficulties may arise in a one-pass compilation process. These difficulties occur when an entity cannot be processed because of a forward reference to information only obtainable from subsequent entities. Classic solutions ask for data structures appropriate for each case. A technique is presented which uses instead control structures, namely events and processes. The work of the compiler-writer becomes easier both conceptually and in practice because he can forget these problems at the outset and he avoids special processing for each problem. This technique has been applied to the construction of an Algol 68 compiler. Three examples from that implementation are described and discussed here.", 24919 acknowledgement = ack-nhfb, 24920 classcodes = "C6120 (File organisation); C6150C (Compilers, interpreters and other processors)", 24921 classification = "723", 24922 corpsource = "Univ. de Rennes, Rennes, France", 24923 journalabr = "Commun ACM", 24924 keywords = "ALGOL 68 compiler; compilation; computer operating systems --- Program Compilers; computer programming languages; control structures; data; data structures; forward reference to information; one pass; program compilers; semantic analysis; source text; structures", 24925 treatment = "G General Review; P Practical", 24926} 24927 24928@Article{Arsac:1979:SSS, 24929 author = "Jacques J. Arsac", 24930 title = "Syntactic Source to Source Transforms and Program Manipulation", 24931 journal = j-CACM, 24932 volume = "22", 24933 number = "1", 24934 pages = "43--54", 24935 month = jan, 24936 year = "1979", 24937 CODEN = "CACMA2", 24938 ISSN = "0001-0782", 24939 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24940 bibsource = "Compendex database", 24941 abstract = "Syntactic transforms are the source to source program transformations which preserve the history of computation, and thus do not modify the execution time. Combined with a small number of primitive semantic transforms, they provide a powerful tool for program manipulation. A complete catalogue of syntactic transforms, and its use for solution of a system of program equations, is given. Examples of derivation of more complex source to source transformations are also presented. Two case studies illustrate the way in which syntactic and semantic source to source transformations may be used for development of clear, simple, and reasonably efficient programs.", 24942 acknowledgement = ack-nhfb, 24943 classcodes = "C4240 (Programming and algorithm theory); C6110 (Systems analysis and programming)", 24944 classification = "723", 24945 corpsource = "Inst. de Programmation, Univ. Pierre et Marie Curie, Paris, France", 24946 journalabr = "Commun ACM", 24947 keywords = "computer programming; program manipulation; program transformations; programming theory; semantic transforms; source to source; source transforms; structured programming; syntactic; transforms", 24948 treatment = "T Theoretical or Mathematical", 24949} 24950 24951@Article{Taulbee:1979:PEP, 24952 author = "O. E. Taulbee and S. D. Conte", 24953 title = "Production and employment of {Ph.D.s} in computer science --- 1977 and 1978", 24954 journal = j-CACM, 24955 volume = "22", 24956 number = "2", 24957 pages = "75--76", 24958 month = feb, 24959 year = "1979", 24960 CODEN = "CACMA2", 24961 ISSN = "0001-0782", 24962 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24963 acknowledgement = ack-nhfb, 24964 classcodes = "C0220 (Computing education and training)", 24965 corpsource = "Univ. of Pittsburgh, Pittsburgh, PA, USA", 24966 keywords = "1977; 1978; computer science; computer science education; employment; Ph.Ds", 24967 treatment = "G General Review", 24968} 24969 24970@Article{Fairley:1979:ECD, 24971 author = "R. E. Fairley", 24972 title = "Employment characteristics of doctoral level computer scientists", 24973 journal = j-CACM, 24974 volume = "22", 24975 number = "2", 24976 pages = "77--78", 24977 month = feb, 24978 year = "1979", 24979 CODEN = "CACMA2", 24980 ISSN = "0001-0782", 24981 bibdate = "Tue Mar 25 13:26:09 MST 1997", 24982 acknowledgement = ack-nhfb, 24983 classcodes = "C0230 (Economic, social and political aspects of computing)", 24984 corpsource = "Colorado State Univ., Fort Collins, CO, USA", 24985 keywords = "academic; business; computer scientists; doctoral; employment; industry; opportunities; Ph.D.; professional aspects; work activities", 24986 treatment = "G General Review", 24987} 24988 24989@Article{Gull:1979:RDS, 24990 author = "W. E. Gull and M. A. Jenkins", 24991 title = "Recursive data structures in {APL.}", 24992 journal = j-CACM, 24993 volume = "22", 24994 number = "2", 24995 pages = "79--96", 24996 month = feb, 24997 year = "1979", 24998 CODEN = "CACMA2", 24999 ISSN = "0001-0782", 25000 MRclass = "68B15 (68E10 68H05)", 25001 MRnumber = "80b:68028", 25002 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25003 bibsource = "Compendex database", 25004 abstract = "A mathematical study of three approaches for defining nested array in APL is presented. Theorems exhibiting the relationships between the definitional systems are given and illustrated through graph representations. One of the approaches is used to define an APL array to be a recursive data structure equivalent to a tree structure in which all data is stored at the leaves as homogeneous arrays of numbers and characters. An extension of APL is proposed that includes new primitive functions to manipulate the nesting level of arrays and new operators to assist in the construction of data-driven algorithms.", 25005 acknowledgement = ack-nhfb, 25006 classcodes = "C6120 (File organisation); C6140D (High level languages)", 25007 classification = "723", 25008 corpsource = "Univ. Zurich, Zurich, Switzerland", 25009 journalabr = "Commun ACM", 25010 keywords = "APL; computer programming languages; data structures; functions; nested arrays; primitive; procedure oriented languages; recursive data structure", 25011 treatment = "T Theoretical or Mathematical", 25012} 25013 25014@Article{Morel:1979:GOS, 25015 author = "{\'E}. Morel and C. Renvoise", 25016 title = "Global Optimization by Suppression of Partial Redundancies", 25017 journal = j-CACM, 25018 volume = "22", 25019 number = "2", 25020 pages = "96--103", 25021 month = feb, 25022 year = "1979", 25023 CODEN = "CACMA2", 25024 ISSN = "0001-0782", 25025 MRclass = "68B05", 25026 MRnumber = "80b:68016", 25027 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25028 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/opt.compiler.bib", 25029 note = "Data Flow Analysis", 25030 abstract = "The elimination of redundant computations and the moving of invariant computations out of loops are often done separately, with invariants moved outward loop by loop. It is proposed to do both at once and to move each expression directly to the entrance of the outermost loop in which it is invariant. This is done by solving a more general problem, i.e. the elimination of computations performed twice on a given execution path. Such computations are termed partially redundant. Moreover, the algorithm does not require any graphical information or restrictions on the shape of the program graph. Testing this algorithm has shown that its execution cost is nearly linear with the size of the program, and that it leads to a smaller optimizer that requires less execution time.", 25031 acknowledgement = ack-nhfb, 25032 classcodes = "C4240 (Programming and algorithm theory); C6150C (Compilers, interpreters and other processors)", 25033 classification = "723", 25034 corpsource = "Compagnie Internat. pour l'Informatique, Honeywell Bull, Louveciennes, France", 25035 journalabr = "Commun ACM", 25036 keywords = "computer programming; execution cost; execution time; optimizer; partial redundancies; program; program compilers; programming theory; redundant computations", 25037 treatment = "T Theoretical or Mathematical", 25038} 25039 25040@Article{Anderson:1979:CPH, 25041 author = "M. R. Anderson and M. G. Anderson", 25042 title = "Comments on Perfect Hashing Functions: {A} Single Probe Retrieving Method for Static Sets", 25043 journal = j-CACM, 25044 volume = "22", 25045 number = "2", 25046 pages = "104--105", 25047 month = feb, 25048 year = "1979", 25049 CODEN = "CACMA2", 25050 ISSN = "0001-0782", 25051 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25052 note = "Corrects errors in \cite{Sprugnoli:1977:PHF}. See corrigendum \cite{Anderson:1979:CCP}.", 25053 acknowledgement = ack-nhfb, 25054 classcodes = "C6130 (Data handling techniques)", 25055 corpsource = "Dept. of Computer and Communication Sci., Univ. of Michigan, Ann Arbor, MI, USA", 25056 keywords = "algorithm; data handling; perfect hashing functions; single probe retrieving method; static sets", 25057 treatment = "T Theoretical or Mathematical", 25058} 25059 25060@Article{Cheriton:1979:TPR, 25061 author = "David R. Cheriton and Michael A. Malcolm and Lawrence S. Melen and Gary R. Sager", 25062 title = "{Thoth}, a Portable Real-Time Operating System", 25063 journal = j-CACM, 25064 volume = "22", 25065 number = "2", 25066 pages = "105--115", 25067 month = feb, 25068 year = "1979", 25069 CODEN = "CACMA2", 25070 ISSN = "0001-0782", 25071 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25072 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib", 25073 abstract = "Thoth is a real-time operating system which is designed to be portable over a large set of machines. It is currently running on two minicomputers with quite different architectures. Both the system and application programs which use it are written in a high-level language. Because the system is implemented by the same software on different hardware, it has the same interface to user programs. Hence, application programs which use Thoth are highly portable. Thoth encourages structuring programs as networks of communicating processes by providing efficient interprocess communication primitives.", 25074 acknowledgement = ack-nhfb, 25075 classcodes = "C6150J (Operating systems)", 25076 classification = "723", 25077 corpsource = "Dept. of Computer Sci., Univ. of Waterloo, Waterloo, Ont., Canada", 25078 journalabr = "Commun ACM", 25079 keywords = "CACM synchronization communication real time; computer operating systems; minicomputers; online; online operation; operating system; portable; real time; software portability; Thoth", 25080 treatment = "P Practical", 25081} 25082 25083@Article{Reed:1979:SES, 25084 author = "David P. Reed and Rajendra K. Kanodia", 25085 title = "Synchronization with Eventcounts and Sequencers", 25086 journal = j-CACM, 25087 volume = "22", 25088 number = "2", 25089 pages = "115--123", 25090 month = feb, 25091 year = "1979", 25092 CODEN = "CACMA2", 25093 ISSN = "0001-0782", 25094 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25095 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; ftp://ftp.ira.uka.de/pub/bibliography/Parallel/par.synch.bib", 25096 abstract = "Synchronization of concurrent processes requires controlling the relative ordering of events in the processes. A new synchronization mechanism is proposed, using abstract objects called eventcounts and sequencers, that allows processes to control the ordering of events directly, rather than using mutual exclusion to protect manipulation of shared variables that control ordering of events. Direct control of ordering seems to simplify correctness arguments and also simplifies implementation in distributed systems. The mechanism is defined formally, and then several examples of its uses are given. The relationship of the mechanism to protection mechanisms in the system is explained; in particular, eventcounts are shown to be applicable to situations where confinement of information matters. An implementation of eventcounts and sequencers in a system with shared memory is described.", 25097 acknowledgement = ack-nhfb, 25098 annote = "Dated, but needs to be referenced every now and again.", 25099 classcodes = "C6150J (Operating systems)", 25100 classification = "723", 25101 corpsource = "Lab. for Computer Sci., MIT, Cambridge, MA, USA", 25102 journalabr = "Commun ACM", 25103 keywords = "computer systems programming; concurrent processes; distributed systems; eventcounts; operating systems (computers); protection; sequences; shared memory; synchronization", 25104 treatment = "T Theoretical or Mathematical", 25105} 25106 25107@Article{Mendelson:1979:OSA, 25108 author = "Haim Mendelson and Joseph S. Pliskin and Uri Yechiali", 25109 title = "Optimal Storage Allocation for Serial Files", 25110 journal = j-CACM, 25111 volume = "22", 25112 number = "2", 25113 pages = "124--130", 25114 month = feb, 25115 year = "1979", 25116 CODEN = "CACMA2", 25117 ISSN = "0001-0782", 25118 MRclass = "68B15", 25119 MRnumber = "80b:68032", 25120 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25121 bibsource = "Compendex database", 25122 abstract = "A computer system uses several serial files. The files reside on a direct-access storage device in which storage space is limited. Records are added to the files either by jobs in batch processing mode, or by on-line transactions. Each transaction (or job) generates a demand vector which designates the space required in each file for record addition. Whenever one file runs out of space, the system must be reorganized. This paper considers several criteria for best allocating storage space to the files.", 25123 acknowledgement = ack-nhfb, 25124 classcodes = "C6120 (File organisation)", 25125 classification = "723", 25126 corpsource = "Dept. of Statistics, Tel Aviv Univ., Tel Aviv, Israel", 25127 journalabr = "Commun ACM", 25128 keywords = "computer operating systems; optimal; serial files; storage allocation", 25129 treatment = "T Theoretical or Mathematical", 25130} 25131 25132@Article{Austing:1979:CRU, 25133 author = "Richard H. Austing and Bruce H. Barnes and Della T. Bonnette and Gerald L. Engel and Gordon Stokes", 25134 title = "Curriculum '78: Recommendations for the Undergraduate Program in Computer Science --- {A} Report of the {ACM} Curriculum Committee on Computer Science", 25135 journal = j-CACM, 25136 volume = "22", 25137 number = "3", 25138 pages = "147--166", 25139 month = mar, 25140 year = "1979", 25141 CODEN = "CACMA2", 25142 ISSN = "0001-0782", 25143 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25144 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 25145 acknowledgement = ack-nhfb, 25146 annote = "A report of the ACM Curriculum Committee on Computer Science. CS 5: Introduction to File Processing (3-0-3) Prerequisite: CS 2. The objectives of this course are: (a) to introduce concepts and techniques of structuring data on bulk storage devices; (2) to provide experience in the use of bulk storage devices; and (3) to provide the foundation for applications of data structures and file processing techniques.", 25147 classcodes = "C0220 (Computing education and training)", 25148 corpsource = "Univ. of Maryland, College Park, MD, USA", 25149 keywords = "computer science; computer science education; courses; curriculum; education; educational courses; elementary level; intermediate level; undergraduate program", 25150 treatment = "G General Review; P Practical", 25151} 25152 25153@Article{Edgar:1979:FMN, 25154 author = "Albert D. Edgar and Samuel C. Lee", 25155 title = "{FOCUS} microcomputer number system", 25156 journal = j-CACM, 25157 volume = "22", 25158 number = "3", 25159 pages = "166--177", 25160 month = mar, 25161 year = "1979", 25162 CODEN = "CACMA2", 25163 ISSN = "0001-0782", 25164 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25165 bibsource = "Compendex database", 25166 abstract = "FOCUS is a number system and supporting computational algorithms especially useful for microcomputer control and other signal processing applications. FOCUS has the wide-ranging character of floating-point numbers with a uniformity of state distributions that give FOCUS better than a twofold accuracy advantage over an equal word length floating-point system. FOCUS computations are typically five times faster than single precision fixed-point or integer arithmetic for a mixture of operations, comparable in speed with hardware arithmetic for many applications. Algorithms for 8-bit and 16-bit implementations of FOCUS are included.", 25167 acknowledgement = ack-nhfb, 25168 classcodes = "C5230 (Digital arithmetic methods); C5250 (Microcomputer techniques)", 25169 classification = "723", 25170 corpsource = "Univ. of Oklahoma, Norman, OK, USA", 25171 journalabr = "Commun ACM", 25172 keywords = "algorithms; arithmetic; computational; computers, microprocessor; digital arithmetic; floating point numbers; FOCUS; microcomputer; microcomputer control; microcomputers; number system; signal processing", 25173 treatment = "P Practical", 25174} 25175 25176@Article{Slagle:1979:ESA, 25177 author = "James Slagle", 25178 title = "Experiments with Some Algorithms that Find Central Solutions for Pattern Classification", 25179 journal = j-CACM, 25180 volume = "22", 25181 number = "3", 25182 pages = "178--183", 25183 month = mar, 25184 year = "1979", 25185 CODEN = "CACMA2", 25186 ISSN = "0001-0782", 25187 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25188 bibsource = "Compendex database", 25189 abstract = "In two-class pattern recognition, it is a standard technique to have an algorithm finding hyperplanes which separates the two classes in a linearly separable training set. The traditional methods find a hyperplane which separates all points in one class from all points in the other, but such a hyperplane is not necessarily centered in the empty space between the two classes. Since a central hyperplane does not favor one class or the other, it should have a lower error rate in classifying new points and is therefore better than a noncentral hyperplane. Six algorithms for finding central hyperplanes are tested on three data sets. Although frequently used in practice, the modified relaxation algorithm is very poor. Three algorithms which are defined in the paper are found to be quite good.", 25190 acknowledgement = ack-nhfb, 25191 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition)", 25192 classification = "723", 25193 corpsource = "Naval Res. Lab., Washington, DC, USA", 25194 journalabr = "Commun ACM", 25195 keywords = "algorithms; central solutions; pattern classification; pattern recognition; pattern recognition systems", 25196 treatment = "T Theoretical or Mathematical", 25197} 25198 25199@Article{Deliyanni:1979:LSN, 25200 author = "Amaryllis Deliyanni and Robert A. Kowalski", 25201 title = "Logic and Semantic Networks", 25202 journal = j-CACM, 25203 volume = "22", 25204 number = "3", 25205 pages = "184--192", 25206 month = mar, 25207 year = "1979", 25208 CODEN = "CACMA2", 25209 ISSN = "0001-0782", 25210 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25211 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib", 25212 abstract = "An extended form of semantic network is defined, which can be regarded as a syntactic variant of the clausal form of logic. By virtue of its relationship with logic,the extended semantic network is provided with a precise semantics, inference rules, and a procedural interpretation. On the other hand, by regarding semantic networks as an abstract data structure for the representation of clauses, we provide a theorem-prover with a potentially useful indexing scheme and path-following strategy for guiding the search for a proof.", 25213 acknowledgement = ack-nhfb, 25214 classcodes = "C1230 (Artificial intelligence); C4210 (Formal logic)", 25215 classification = "723", 25216 corpsource = "Univ. of Athens, Athens, Greece", 25217 journalabr = "Commun ACM", 25218 keywords = "abstract data; computer metatheory; formal logic; inference rules; logic; semantic networks; structure; theorem prover; theorem proving", 25219 treatment = "T Theoretical or Mathematical", 25220} 25221 25222@Article{Motzkin:1979:UNM, 25223 author = "Dalia Motzkin", 25224 title = "Use of Normal Multiplication Tables for Information Storage and Retrieval", 25225 journal = j-CACM, 25226 volume = "22", 25227 number = "3", 25228 pages = "193--207", 25229 month = mar, 25230 year = "1979", 25231 CODEN = "CACMA2", 25232 ISSN = "0001-0782", 25233 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25234 bibsource = "Compendex database", 25235 abstract = "A method is described for the organization and retrieval of attribute based information systems, using the normal multiplication table as a directory for the information system. Algorithms for the organization and retrieval of information are described. This method is particularly suitable for queries requesting a group of information items, all of which possess a particular set of attributes (and possibly some other attributes as well). Several examples are given; the results with respect to the number of disk accesses and disk space are compared to other common approaches. Algorithms evaluating the appropriateness of the above approach to a given information system are described. For a certain class of information systems, the normal multiplication table method yields far more rapid retrieval with a more economical space requirement than conventional systems. Moreover this method incorporates an improved modification of the inverted file technique.", 25236 acknowledgement = ack-nhfb, 25237 classcodes = "C6120 (File organisation)", 25238 classification = "723; 901", 25239 corpsource = "Univ. of Haifa, Haifa, Israel", 25240 journalabr = "Commun ACM", 25241 keywords = "attribute based information systems; directory; disk accesses; disk space; file organisation; information retrieval; information retrieval systems; information storage; inverted file; normal multiplication tables; retrieval; storage allocation", 25242 treatment = "T Theoretical or Mathematical", 25243} 25244 25245@Article{McMaster:1979:CAA, 25246 author = "C. L. McMaster", 25247 title = "Corrigendum: {``An Analysis of Algorithms for the Dutch National Flag Problem''}", 25248 journal = j-CACM, 25249 volume = "22", 25250 number = "3", 25251 pages = "207--207", 25252 month = mar, 25253 year = "1979", 25254 CODEN = "CACMA2", 25255 ISSN = "0001-0782", 25256 bibdate = "Sat Jan 18 15:42:53 1997", 25257 note = "See \cite{McMaster:1978:AAD}.", 25258} 25259 25260@Article{Lesk:1979:DTP, 25261 author = "Arthur M. Lesk", 25262 title = "Detection of Three-Dimensional Patterns of Atoms in Chemical Structures", 25263 journal = j-CACM, 25264 volume = "22", 25265 number = "4", 25266 pages = "219--224", 25267 month = apr, 25268 year = "1979", 25269 CODEN = "CACMA2", 25270 ISSN = "0001-0782", 25271 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25272 bibsource = "Compendex database", 25273 abstract = "An algorithm for detecting occurrences of a three-dimensional pattern of objects within a larger structure is presented. The search technique presented used the geometric structure of the pattern to define characteristics demanded of candidates for matching. This is useful in cases where the properties of each atom, considered individually, do not adequately limit the number of sets of possible matchings. Several applications of this technique in the field of chemistry are: (1) in pharmacology: Searching for a common constellation of atoms in molecules possessing similar biological activities; (2) in X-ray crystallography: fitting a structure or a structural fragment to a set of peaks in the electron-density distribution of a Fourier map; (3) in chemical documentation: retrieving from a file the structures containing specified substructures.", 25274 acknowledgement = ack-nhfb, 25275 classcodes = "C7320 (Physics and chemistry computing)", 25276 classification = "462; 482; 501; 723; 804; 901", 25277 corpsource = "Fairleigh Dickinson Univ., Teaneck, NJ, USA", 25278 journalabr = "Commun ACM", 25279 keywords = "atoms; chemical documentation; chemical structures; chemistry computing; crystallography; crystallography --- X-Ray Analysis; drug products; information science --- Information Retrieval; pattern recognition; pattern recognition systems; pharmacology; search; three dimensional; X-ray", 25280 treatment = "A Application", 25281} 25282 25283@Article{Cale:1979:PPP, 25284 author = "E. G. Cale and L. L. Gremillion and J. L. McKenney", 25285 title = "Price\slash Performance Patterns of {U.S.} Computer Systems", 25286 journal = j-CACM, 25287 volume = "22", 25288 number = "4", 25289 pages = "225--233", 25290 month = apr, 25291 year = "1979", 25292 CODEN = "CACMA2", 25293 ISSN = "0001-0782", 25294 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25295 bibsource = "Compendex database", 25296 abstract = "Econometric models of the U. S. computer market have been developed to study the relationships between system price and hardware performance. Single measures of price-performance such as ``Grosch's Law'' are shown to be so oversimplified as to be meaningless. Multiple-regression models predicting system cost as a function of several hardware characteristics do, however, reveal a market dichotomy. On one hand there exists a stable, price predictable market for larger, general purpose computer systems. The other market is the developing one for small business computer systems, a market which is relatively unstable with low price predictability.", 25297 acknowledgement = ack-nhfb, 25298 classcodes = "C0230 (Economic, social and political aspects of computing)", 25299 classification = "722", 25300 corpsource = "Harvard Univ., Boston, MA, USA", 25301 journalabr = "Commun ACM", 25302 keywords = "computer market; digital computers; hardware performance; price predictability; price/performance; system price; US", 25303 keywords = "computer systems, digital", 25304 treatment = "E Economic", 25305} 25306 25307@Article{Bucci:1979:MDD, 25308 author = "Giacomo Bucci and Donald N. Streeter", 25309 title = "Methodology for the Design of Distributed Information Systems", 25310 journal = j-CACM, 25311 volume = "22", 25312 number = "4", 25313 pages = "233--245", 25314 month = apr, 25315 year = "1979", 25316 CODEN = "CACMA2", 25317 ISSN = "0001-0782", 25318 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25319 bibsource = "Compendex database", 25320 abstract = "A macro model of a distributed information system is presented. The model describes the major costs of using an information system from the perspective of the end-user. The model is intended to provide guidance to the system designer by making evident the effect of various design and operating parameters on overall cost per transaction. The technique is illustrated by application to the design of an interactive transaction processing system.", 25321 acknowledgement = ack-nhfb, 25322 classcodes = "C6110 (Systems analysis and programming)", 25323 classification = "722", 25324 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 25325 journalabr = "Commun ACM", 25326 keywords = "computer systems, digital; costs; design; distributed information systems; distributed processing; macro; methodology; model; systems analysis", 25327 treatment = "A Application; T Theoretical or Mathematical", 25328} 25329 25330@Article{Hanson:1979:MPU, 25331 author = "Richard J. Hanson and John A. Wisniewski", 25332 title = "A Mathematical Programming Updating Method Using Modified {Givens} Transformations and Applied to {LP} Problems", 25333 journal = j-CACM, 25334 volume = "22", 25335 number = "4", 25336 pages = "245--251", 25337 month = apr, 25338 year = "1979", 25339 CODEN = "CACMA2", 25340 ISSN = "0001-0782", 25341 MRclass = "90C05 (65F35)", 25342 MRnumber = "80c:90096", 25343 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25344 bibsource = "Compendex database", 25345 abstract = "An efficient and numerically stable method is presented for the problem of updating an orthogonal decomposition of a matrix of column (or row) vectors. The fundamental idea is to add a column (or row) analogous to adding an additional row of data in linear least squares problem. A column (or row) is dropped by a formal scaling with the imaginary unit, followed by least squares addition of the column (or row). The elimination process for the procedure is successive application of the Givens transformation in modified (more efficient) form. These ideas are illustrated with an implementation of the revised simplex method. The algorithm is a general purpose one that does not account for any particular structure or sparsity in the equations. Some suggested computational tests for determining signs of various controlling parameters in the revised simplex algorithm are mentioned. A simple means of constructing test cases and some sample computing times are presented.", 25346 acknowledgement = ack-nhfb, 25347 classcodes = "C1180 (Optimisation techniques)", 25348 classification = "723", 25349 corpsource = "Sandia Labs., Albuquerque, NM, USA", 25350 journalabr = "Commun ACM", 25351 keywords = "linear programming; mathematical programming; mathematical programming, linear; modified Givens; revised simplex; transformations; updating", 25352 treatment = "T Theoretical or Mathematical", 25353} 25354 25355@Article{Brelaz:1979:NMC, 25356 author = "Daniel Br{\'e}laz", 25357 title = "New Methods to Color the Vertices of a Graph", 25358 journal = j-CACM, 25359 volume = "22", 25360 number = "4", 25361 pages = "251--256", 25362 month = apr, 25363 year = "1979", 25364 CODEN = "CACMA2", 25365 ISSN = "0001-0782", 25366 MRclass = "90B35", 25367 MRnumber = "80c:90080", 25368 mrreviewer = "G. Berman", 25369 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25370 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/clique.color.bib", 25371 abstract = "Efficient new heuristic methods to color the vertices of a graph are described which rely upon the comparison of the degrees and structure of a graph. A method is developed which is exact for bipartite graphs and is an important part of heuristic procedures to find maximal cliques in general graphs. Finally an exact method is given which performs better than the Randall-Brown algorithm and is able to color larger graphs, and the new heuristic methods, the classical methods, and the exact method are compared.", 25372 acknowledgement = ack-nhfb, 25373 annote = "Successive augmentation approach to graph coloring. DSATUR chooses the vertex adjacent to the largest number of distinctly colored vertices. Paper also discusses an implicit enumeration scheme for finding an optimal coloring using some of the principles of DSATUR to guide the search.", 25374 classcodes = "C1160 (Combinatorial mathematics)", 25375 classification = "912; 921", 25376 corpsource = "Ecole Polytech. Federale de Lausanne, Lausanne, Switzerland", 25377 journalabr = "Commun ACM", 25378 keywords = "bipartite graphs; cliques; colouring; graph; graph colouring; heuristic; mathematical techniques --- Graph Theory; maximal; operations research; vertices", 25379 treatment = "T Theoretical or Mathematical", 25380} 25381 25382@Article{DeMillo:1979:SPP, 25383 author = "Richard A. {De Millo} and Richard J. Lipton and Alan J. Perlis", 25384 title = "Social Processes and Proofs of Theorems and Programs", 25385 journal = j-CACM, 25386 volume = "22", 25387 number = "5", 25388 pages = "271--280", 25389 month = may, 25390 year = "1979", 25391 CODEN = "CACMA2", 25392 ISSN = "0001-0782", 25393 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25394 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/softeng.bib", 25395 abstract = "It is argued that formal verifications of programs, no matter how obtained, will not play the same key role in the development of computer science and software engineering as proofs do in mathematics. Furthermore the absence of continuity, the inevitability of change, and the complexity of specification of significantly many real programs make the formal verification process difficult to justify and manage. It is felt that ease of formal verification should not dominate program language design.", 25396 acknowledgement = ack-nhfb, 25397 classcodes = "C4240 (Programming and algorithm theory)", 25398 classification = "723", 25399 corpsource = "Georgia Inst. of Technol., Atlanta, GA, USA", 25400 journalabr = "Commun ACM", 25401 keywords = "computer programming; formal verification; philosophical aspects; program language design; programming theory; specification", 25402 treatment = "G General Review; T Theoretical or Mathematical", 25403} 25404 25405@Article{Chang:1979:IAD, 25406 author = "Ernest Chang and Rosemary Roberts", 25407 title = "An Improved Algorithm for Decentralized Extrema-Finding in Circular Configurations of Processors", 25408 journal = j-CACM, 25409 volume = "22", 25410 number = "5", 25411 pages = "281--283", 25412 month = may, 25413 year = "1979", 25414 CODEN = "CACMA2", 25415 ISSN = "0001-0782", 25416 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25417 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib", 25418 note = "They present a deterministic distributed algorithm for finding the largest of a set of $n$ uniquely numbered processes in a ring. The algorithm uses $O(n \log n)$ messages on the average and $O(n^2)$ messages in the worst case, and does not assume that $n$ is known a priori.", 25419 abstract = "An improvement is presented of LeLann's algorithm for finding the largest (or smallest) of a set of uniquely numbered processes arranged in a circle, in which no central controller exists and the number of processes is not known a priori. This decentralized algorithm uses a technique of selective message extinction in order to achieve an average number of message passes of order (n log n) rather than O(n**2).", 25420 acknowledgement = ack-nhfb, 25421 classcodes = "C4290 (Other computer theory); C6150J (Operating systems)", 25422 classification = "723", 25423 corpsource = "Univ. of Toronto, Ont., Canada", 25424 journalabr = "Commun ACM", 25425 keywords = "algorithm; circular configurations; computer operating systems; computer programming --- Subroutines; decentralized; distributed processing; distributed systems; extrema; operating systems; operating systems (computers); processes", 25426 treatment = "T Theoretical or Mathematical", 25427 xxtitle = "An improved algorithm for decentralized extrema-finding in circular configurations of processes", 25428} 25429 25430@Article{Sterling:1979:CDC, 25431 author = "T. D. Sterling", 25432 title = "Consumer Difficulties with Computerized Transactions: an Empirical Investigation", 25433 journal = j-CACM, 25434 volume = "22", 25435 number = "5", 25436 pages = "283--289", 25437 month = may, 25438 year = "1979", 25439 CODEN = "CACMA2", 25440 ISSN = "0001-0782", 25441 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25442 bibsource = "Compendex database", 25443 abstract = "Results show that with the present state of the art, approximately 40 percent of individuals (or households) having average contacts with different types of accounts experience one or more errors per year. Eighty percent relate to billing. Attempts to correct errors often turned out to be difficult and not always successful. There appears to be some conflict between computer-using organizations and their public. Also the role of poor management packages including poor software is indicated. While most management systems may be adequate, results of the survey raise concerns about the timeliness and the number of designs of very large linked program packages (as EFT for instance).", 25444 acknowledgement = ack-nhfb, 25445 classcodes = "C0230 (Economic, social and political aspects of computing); C7100 (Business and administration); C7120 (Financial computing)", 25446 classification = "723", 25447 corpsource = "Simon Fraser Univ., Burnaby, BC, Canada", 25448 journalabr = "Commun ACM", 25449 keywords = "administrative data processing; billing; computerized transactions; consumers; data processing, business; economic and sociological; effects; errors; management; packages", 25450 treatment = "P Practical", 25451} 25452 25453@Article{Reynolds:1979:RAA, 25454 author = "John C. Reynolds", 25455 title = "Reasoning About Arrays", 25456 journal = j-CACM, 25457 volume = "22", 25458 number = "5", 25459 pages = "290--299", 25460 month = may, 25461 year = "1979", 25462 CODEN = "CACMA2", 25463 ISSN = "0001-0782", 25464 MRclass = "68B10 (68E05)", 25465 MRnumber = "80f:68018", 25466 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25467 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Compiler/reynolds.bib", 25468 abstract = "A variety of concepts, laws, and notations are presented which facilitate reasoning about arrays. The basic concepts include intervals and their partitions, functional restriction, images, pointwise extension of relations, ordering, single-point variation of functions, various equivalence relations for array values, and concatenation. The effectiveness of these ideas is illustrated by informal descriptions of algorithms for binary search and merging, and by a short formal proof.", 25469 acknowledgement = ack-nhfb, 25470 checked = "4 September 1990", 25471 classcodes = "C4240 (Programming and algorithm theory)", 25472 classification = "723", 25473 corpsource = "Syracuse Univ., Syracuse, NY, USA", 25474 journalabr = "Commun ACM", 25475 keywords = "arrays; binary; computer programming; concatenation; concepts; equivalence relations; extension of relations; functional restriction; functions; imaging; intervals; laws; merging; notations; ordering; partitions; pointwise; programming theory; programs; reasoning; search; single point variation of", 25476 treatment = "A Application; T Theoretical or Mathematical", 25477} 25478 25479@Article{Manthey:1979:MDM, 25480 author = "Michael J. Manthey", 25481 title = "Model for and Discussion of Multi-Interpreter Systems", 25482 journal = j-CACM, 25483 volume = "22", 25484 number = "5", 25485 pages = "299--309", 25486 month = may, 25487 year = "1979", 25488 CODEN = "CACMA2", 25489 ISSN = "0001-0782", 25490 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25491 bibsource = "Compendex database", 25492 abstract = "A multi-interpreter system is a system in which programs execute by virtue of being interpreted by other programs, which themselves may either be interpreted (i.e. nested interpreters) or run directly on the host machine. The model reveals the anatomy of interpreters and how these differ from procedures, and exhibits links to protection domains and multiprocessor architectures.", 25493 acknowledgement = ack-nhfb, 25494 classcodes = "C6150C (Compilers, interpreters and other processors)", 25495 classification = "722; 723", 25496 corpsource = "State Univ. of New York, Buffalo, NY, USA", 25497 journalabr = "Commun ACM", 25498 keywords = "computer systems, digital; multi interpreter systems; multiprocessor; program interpreters; programs", 25499 treatment = "A Application; T Theoretical or Mathematical", 25500} 25501 25502@Article{Lemos:1979:ISW, 25503 author = "R. S. Lemos", 25504 title = "An implementation of structured walk-throughs in teaching {COBAL} programming", 25505 journal = j-CACM, 25506 volume = "22", 25507 number = "6", 25508 pages = "335--340", 25509 month = jun, 25510 year = "1979", 25511 CODEN = "CACMA2", 25512 ISSN = "0001-0782", 25513 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25514 acknowledgement = ack-nhfb, 25515 classcodes = "C0220 (Computing education and training); C6110 (Systems analysis and programming)", 25516 corpsource = "California State Univ., Los Angeles, CA, USA", 25517 keywords = "COBAL programming; computer science education; multiple covariance; programming; structured walk-throughs; teaching", 25518 treatment = "G General Review", 25519} 25520 25521@Article{Busenberg:1979:APP, 25522 author = "S. N. Busenberg and W. C. Tam", 25523 title = "An academic program providing realistic training in software engineering", 25524 journal = j-CACM, 25525 volume = "22", 25526 number = "6", 25527 pages = "341--345", 25528 month = jun, 25529 year = "1979", 25530 CODEN = "CACMA2", 25531 ISSN = "0001-0782", 25532 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25533 acknowledgement = ack-nhfb, 25534 classcodes = "C6110 (Systems analysis and programming)", 25535 corpsource = "Harvey Mudd Coll., Claremont, CA, USA", 25536 keywords = "Clinic program; communication skills; computer science education; methodology; realistic training; software design; software engineering; software project management; team work", 25537 treatment = "G General Review", 25538} 25539 25540@Article{Alter:1979:MAF, 25541 author = "Steven Alter", 25542 title = "Model for Automating File and Program Design in Business Application Systems", 25543 journal = j-CACM, 25544 volume = "22", 25545 number = "6", 25546 pages = "345--353", 25547 month = jun, 25548 year = "1979", 25549 CODEN = "CACMA2", 25550 ISSN = "0001-0782", 25551 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25552 bibsource = "Compendex database", 25553 abstract = "A model is discussed for finding an efficient implementation of a business application system whose logical specifications have been determined in advance. The model views file and program design as a problem of systematically coordinating the configurations of datasets and computations. It uses a straightforward search technique to determine aggregations of computations, aggregations of datasets, device, organization, and key order for each dataset, key order for each computation, and access method for each dataset-computation pair. Although computational results are presented for a sample problem involving 54 computations and 49 datasets, the main point of the paper is that the underlying model works computationally and is simple enough to be adapted to many file design situations.", 25554 acknowledgement = ack-nhfb, 25555 classcodes = "C6120 (File organisation)", 25556 classification = "723", 25557 corpsource = "Steven Alter and Associates Inc., San Francisco, CA, USA", 25558 journalabr = "Commun ACM", 25559 keywords = "automating file; business application; computations; computer programming; datasets; design; file; file organisation; program design; search technique; software engineering; systems", 25560 treatment = "P Practical", 25561} 25562 25563@Article{Feldman:1979:HLP, 25564 author = "Jerome A. Feldman", 25565 title = "High Level Programming for Distributed Computing", 25566 journal = j-CACM, 25567 volume = "22", 25568 number = "6", 25569 pages = "353--368", 25570 month = jun, 25571 year = "1979", 25572 CODEN = "CACMA2", 25573 ISSN = "0001-0782", 25574 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25575 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib", 25576 abstract = "An approach to distributed computing at the level of general purpose programming languages is described. Based on primitive notions of module, message, and transaction key, the methodology is shown to be independent of particular languages and machines. It appears to be useful for programming a wide range of tasks. This is part of an ambitious program of development in advanced programming languages, and relations with other aspects of the project are also discussed.", 25577 acknowledgement = ack-nhfb, 25578 classcodes = "C6110 (Systems analysis and programming)", 25579 classification = "723", 25580 corpsource = "Univ. of Rochester, Rochester, NY, USA", 25581 journalabr = "Commun ACM", 25582 keywords = "computer programming languages; distributed computing; distributed processing; high level programming; message; misc modules messages; module; multiprogramming; transaction key", 25583 treatment = "G General Review", 25584} 25585 25586@Article{Sedgewick:1979:CIQ, 25587 author = "Robert Sedgewick", 25588 title = "Corrigendum: {``Implementing {Quicksort} Programs''}", 25589 journal = j-CACM, 25590 volume = "22", 25591 number = "6", 25592 pages = "368--368", 25593 month = jun, 25594 year = "1979", 25595 CODEN = "CACMA2", 25596 ISSN = "0001-0782", 25597 bibdate = "Sat Jan 18 15:43:13 1997", 25598 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/Seiferas/1979.bib", 25599 note = "See \cite{Sedgewick:1978:IQP}.", 25600} 25601 25602@Article{Shapira:1979:COP, 25603 author = "R. Shapira and H. Freeman", 25604 title = "The Cyclic Order Property of Vertices as an Aid in Scene Analysis", 25605 journal = j-CACM, 25606 volume = "22", 25607 number = "6", 25608 pages = "368--375", 25609 month = jun, 25610 year = "1979", 25611 CODEN = "CACMA2", 25612 ISSN = "0001-0782", 25613 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25614 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.79.bib", 25615 abstract = "A cyclic-order property is defined for bodies bounded by smooth-curved faces. The property is shown to be useful for analyzing pictures of such bodies, particularly when the line data extracted from the pictures are imperfect. This property augments previously known grammatical rules that determine the existence of three-dimensional bodies corresponding to given two-dimensional line-structure data.", 25616 acknowledgement = ack-nhfb, 25617 classcodes = "B6140C (Optical information, image and video signal processing); C1250 (Pattern recognition); C1260 (Information theory)", 25618 classification = "723", 25619 corpsource = "Rensselaer Polytech. Inst., Troy, NY, USA", 25620 journalabr = "Commun ACM", 25621 keywords = "AI; algorithmic aspects; algorithms; computer graphics; cyclic order; grammatical; image processing; line data; pattern; pattern recognition; picture processing; pictures; recognition; reconstruction; reconstruction of objects and three-dimensional graphics; rules; scene analysis; see Section 6; vertices", 25622} 25623 25624@Article{Winograd:1979:BPL, 25625 author = "T. Winograd", 25626 title = "Beyond Programming Languages", 25627 journal = j-CACM, 25628 volume = "22", 25629 number = "7", 25630 pages = "391--401", 25631 month = jul, 25632 year = "1979", 25633 CODEN = "CACMA2", 25634 ISSN = "0001-0782", 25635 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25636 abstract = "As computer technology matures, our growing ability to create large systems is leading to basic changes in the nature of programming. Current programming language concepts will not be adequate for building and maintaining systems of the complexity called for by the tasks we attempt. Just as high level languages enabled the programmer to escape from the intricacies of a machine's order code, higher level programming systems can provide the means to understand and manipulate complex systems and components. In order to develop such systems, we need to shift our attention away from the detailed specification of algorithms, towards the description of the properties of the packages and objects with which we build. This paper analyzes some of the shortcomings of programming languages as they now exist, and lays out some possible directions for future research.", 25637 acknowledgement = ack-nhfb, 25638 classcodes = "C0200 (General computer topics); C6110 (Systems analysis and programming); C6140D (High level languages)", 25639 corpsource = "Stanford Univ., Stanford, CA, USA", 25640 keywords = "future; higher level programming systems; Programming; programming languages; programming systems; research; shortcomings; systems development; technological forecasting", 25641 treatment = "G General Review", 25642} 25643 25644@Article{Preparata:1979:ORT, 25645 author = "F. P. Preparata", 25646 title = "An Optimal Real-Time Algorithm for Planar Convex Hulls", 25647 journal = j-CACM, 25648 volume = "22", 25649 number = "7", 25650 pages = "402--405", 25651 month = jul, 25652 year = "1979", 25653 CODEN = "CACMA2", 25654 ISSN = "0001-0782", 25655 MRclass = "68C05 (68C25)", 25656 MRnumber = "80e:68075", 25657 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25658 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.79.bib", 25659 abstract = "An algorithm is described for the construction in real-time of the convex hull of a set of n points in the plane. Using an appropriate data structure, the algorithm constructs the convex hull by successive updates, each taking time O(log n), thereby achieving a total processing time O(n log n).", 25660 acknowledgement = ack-nhfb, 25661 classcodes = "C6130B (Graphics techniques)", 25662 classification = "723", 25663 corpsource = "Univ. of Illinois, Urbana, IL, USA", 25664 journalabr = "Commun ACM", 25665 keywords = "algorithmic aspects; computer programming; convex hull and mathematical aspects", 25666 keywords = "algorithm; computer graphics; data structure; optimal; planar convex hulls; real time", 25667 treatment = "P Practical", 25668} 25669 25670@Article{Fischer:1979:SRT, 25671 author = "Patrick C. Fischer and Robert L. Probert", 25672 title = "Storage Reorganization Techniques for Matrix Computation in a Paging Environment", 25673 journal = j-CACM, 25674 volume = "22", 25675 number = "7", 25676 pages = "405--415", 25677 month = jul, 25678 year = "1979", 25679 CODEN = "CACMA2", 25680 ISSN = "0001-0782", 25681 MRclass = "68B20 (65F30)", 25682 MRnumber = "80e:68055", 25683 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25684 bibsource = "Compendex database", 25685 abstract = "In order to multiply matrices while minimizing the number of page fetches required, it is often more efficient to reorganize the data into submatrix form and to use block multiplication rather than to use the best known algorithms which leave the matrices stored in row-(or column-)oriented form. An efficient method for accomplishing this reorganization is given. This also makes possible the derivation of an asymptotically better bound for multiplication of matrices given in row-oriented form by adapting the technique of Strassen to the reorganized data. The reorganization\slash block multiplication scheme is shown to be advantageous for matrices and pages of realistic size; the Strassen adaptation is not. The former scheme is also shown to be advantageous even if the transpose of one of the matrices is available at no additional cost.", 25686 acknowledgement = ack-nhfb, 25687 classcodes = "C4140 (Linear algebra); C6120 (File organisation); C6130 (Data handling techniques)", 25688 classification = "723", 25689 corpsource = "Pennsylvania State Univ., University Park, PA, USA", 25690 journalabr = "Commun ACM", 25691 keywords = "block; computer operating systems; matrix algebra; matrix computation; multiplication; paging; reorganization; virtual storage", 25692 treatment = "P Practical", 25693} 25694 25695@Article{Hine:1979:CRT, 25696 author = "J. H. Hine and I. Mitrani and S. Tsur", 25697 title = "The Control of Response Times in Multi-Class Systems by Memory Allocation", 25698 journal = j-CACM, 25699 volume = "22", 25700 number = "7", 25701 pages = "415--424", 25702 month = jul, 25703 year = "1979", 25704 CODEN = "CACMA2", 25705 ISSN = "0001-0782", 25706 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25707 bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib", 25708 abstract = "The possibility of giving different quality of service to jobs of different classes by regulating their memory allocation is examined in the context of a paged computer system. Two parameterized algorithms which partition the main memory between two classes of jobs are considered. Initially, a closed system consisting of a processor and paging and file devices, with fixed number of jobs, is studied to determine optimal degrees of multiprogramming and the proportion of processor time devoted to each class. Applying a decomposition approach and treating the closed system as a single server, the response times in an open system with external arrivals are studied. The object is to investigate the effect of the memory allocation parameters on the expected response times under the two algorithms. Numerical solutions and economical lower bounds for the expected response times as functions of the control parameters are obtained. A way of applying the results to systems with more than two job classes is indicated.", 25709 acknowledgement = ack-nhfb, 25710 annote = "The possibility of giving different quality of service to jobs of different classes by regulating their memory allocation is examined in the context of a paged computer system.", 25711 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 25712 classification = "723", 25713 corpsource = "Univ. of Newcastle upon Tyne, Newcastle upon Tyne, UK", 25714 country = "USA", 25715 descriptors = "Queueing network; response time; memory management; priority; performance evaluation; memory organization; operating system;", 25716 enum = "1369", 25717 journalabr = "Commun ACM", 25718 keywords = "computer operating systems; control; memory allocation; multiclass systems; multiprogramming; operating systems (computers); paged computer; paging; performance control; Queueing networks; response times; storage; storage allocation; system; virtual; virtual memory", 25719 language = "English", 25720 references = "13", 25721 treatment = "P Practical", 25722} 25723 25724@Article{Kowalski:1979:ALC, 25725 author = "Robert A. Kowalski", 25726 title = "Algorithm = Logic + Control", 25727 journal = j-CACM, 25728 volume = "22", 25729 number = "7", 25730 pages = "424--436", 25731 month = jul, 25732 year = "1979", 25733 CODEN = "CACMA2", 25734 ISSN = "0001-0782", 25735 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25736 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Ai/prolog.bib and ftp://ftp.ira.uka.de/pub/bibliography/Ai/prolog.1.bib", 25737 acknowledgement = ack-nhfb, 25738 classcodes = "C4240 (Programming and algorithm theory)", 25739 corpsource = "Imperial Coll., London, UK", 25740 keywords = "algorithm; algorithm theory; computer programs; control; logic; programming theory; prolog; theorem proving", 25741 treatment = "T Theoretical or Mathematical", 25742} 25743 25744@Article{Wong:1979:SAP, 25745 author = "J. W. Wong and G. Scott Graham", 25746 title = "Self-Assessment Procedure {VI}: a self-assessment procedure dealing with queueing network models of computer systems", 25747 journal = j-CACM, 25748 volume = "22", 25749 number = "8", 25750 pages = "449--454", 25751 month = aug, 25752 year = "1979", 25753 CODEN = "CACMA2", 25754 ISSN = "0001-0782", 25755 bibdate = "Sat Jan 18 15:44:35 1997", 25756 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib", 25757 country = "USA", 25758 descriptors = "Queueing system; simulation; measurement; communication network; solved exercise; bibliography;", 25759 enum = "3335", 25760 language = "English", 25761 references = "34", 25762} 25763 25764@Article{Floyd:1979:PP, 25765 author = "R. W. Floyd", 25766 title = "The paradigms of programming", 25767 journal = j-CACM, 25768 volume = "22", 25769 number = "8", 25770 pages = "455--460", 25771 month = aug, 25772 year = "1979", 25773 CODEN = "CACMA2", 25774 ISSN = "0001-0782", 25775 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25776 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Ai/constr.logic.bib", 25777 acknowledgement = ack-nhfb, 25778 classcodes = "C6110 (Systems analysis and programming)", 25779 corpsource = "Dept. of Computer Sci., Stanford Univ., Stanford, CA, USA", 25780 keywords = "computer programs; languages; paradigms; programming; structural programming", 25781 treatment = "G General Review", 25782} 25783 25784@Article{Hirschberg:1979:CCC, 25785 author = "D. S. Hirschberg and A. K. Chandra and D. V. Sarwate", 25786 title = "Computing Connected Components on Parallel Computers", 25787 journal = j-CACM, 25788 volume = "22", 25789 number = "8", 25790 pages = "461--464", 25791 month = aug, 25792 year = "1979", 25793 CODEN = "CACMA2", 25794 ISSN = "0001-0782", 25795 MRclass = "68C25 (68B20 68E10)", 25796 MRnumber = "80h:68041", 25797 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25798 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Parallel/Multi.bib", 25799 abstract = "We present a parallel algorithm which uses $n^2$ processors to find the connected components of an undirected graph with $n$ vertices in time $O(log2n)$. An $O(\log_2n)$ time bound also can be achieved using only $n n/\log_2n$ processors. The algorithm can be used to find the transitive closure of a symmetric Boolean matrix. We assume that the processors have access to a common memory. Simultaneous access to the same location is permitted for fetch instructions but not for store instructions.", 25800 acknowledgement = ack-nhfb, 25801 classcodes = "C6120 (File organisation); C6150J (Operating systems)", 25802 corpsource = "Dept. of Electrical Engng., Rice Univ., Houston, TX, USA", 25803 keywords = "(computers); algorithm; algorithms; Boolean matrix; connected component; connected components; fetch instructions; file organisation; Graph theory; graph theory; operating systems; OS; parallel; parallel computers; parallel processing; store instructions; time bound; transitive closure; undirected graph", 25804 treatment = "P Practical; T Theoretical or Mathematical", 25805} 25806 25807@Article{Dershowitz:1979:PTM, 25808 author = "Nachum Dershowitz and Zohar Manna", 25809 title = "Proving Termination with Multiset Orderings", 25810 journal = j-CACM, 25811 volume = "22", 25812 number = "8", 25813 pages = "465--476", 25814 month = aug, 25815 year = "1979", 25816 CODEN = "CACMA2", 25817 ISSN = "0001-0782", 25818 MRclass = "68B10", 25819 MRnumber = "80g:68017", 25820 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25821 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/obscure.bib", 25822 acknowledgement = ack-nhfb, 25823 classcodes = "C4240 (Programming and algorithm theory)", 25824 corpsource = "Computer Sci. Dept., Stanford Univ., Stanford, CA, USA", 25825 keywords = "multiset orderings; program variables; programming theory; proving the termination of programs; termination function", 25826 treatment = "T Theoretical or Mathematical", 25827} 25828 25829@Article{Denning:1979:SPC, 25830 author = "Dorothy E. Denning", 25831 title = "Secure Personal Computing in an Insecure Network", 25832 journal = j-CACM, 25833 volume = "22", 25834 number = "8", 25835 pages = "476--482", 25836 month = aug, 25837 year = "1979", 25838 CODEN = "CACMA2", 25839 ISSN = "0001-0782", 25840 MRclass = "68A05 (68B15 94A99)", 25841 MRnumber = "80d:68010", 25842 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25843 acknowledgement = ack-nhfb, 25844 classcodes = "C6130 (Data handling techniques)", 25845 corpsource = "Computer Sci. Dept., Purdue Univ., West Lafayette, IN, USA", 25846 keywords = "communication links; confidential data; confidential files; encoding; encryption; insecure network; secure personal computing; security of data", 25847 treatment = "P Practical", 25848} 25849 25850@Article{Nelson:1979:FRS, 25851 author = "L. S. Nelson", 25852 title = "Further remark on stably updating mean and standard deviation estimates", 25853 journal = j-CACM, 25854 volume = "22", 25855 number = "8", 25856 pages = "483--483", 25857 month = aug, 25858 year = "1979", 25859 CODEN = "CACMA2", 25860 ISSN = "0001-0782", 25861 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25862 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib", 25863 acknowledgement = ack-nhfb, 25864 classcodes = "C6110 (Systems analysis and programming); C7310 (Mathematics computing)", 25865 corpsource = "Appl. Math. Lab., General Electric Co., Louisville, KY, USA", 25866 country = "USA", 25867 descriptors = "expectation; standard deviation; moment estimation; numerical method", 25868 enum = "2249", 25869 keywords = "Mean; programming; standard deviation; standard deviation estimates; statistics; updating", 25870 language = "English", 25871 references = "3", 25872 treatment = "P Practical; T Theoretical or Mathematical", 25873} 25874 25875@Article{Feldman:1979:REC, 25876 author = "Jerome A. Feldman and William R. Sutherland", 25877 title = "Rejuvenating Experimental Computer Science --- {A} Report to the {National Science Foundation} and Others", 25878 journal = j-CACM, 25879 volume = "22", 25880 number = "9", 25881 pages = "497--502", 25882 month = sep, 25883 year = "1979", 25884 CODEN = "CACMA2", 25885 ISSN = "0001-0782", 25886 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25887 abstract = "This report is based on the results of an NSF sponsored workshop held in Washington, DC, on November 2, 1978. The co-authors of the report are: Gordon Bell, Digital Equipment Corporation; Bernard A. Galler, University of Michigan; Patricia Goldberg, IBM Corporation; John Hamblen, University of Missouri at Rolla; Elliot Pinson, Bell Telephone Laboratories; and Ivan Sutherland, California Institute of Technology. Also participating in the workshop were representatives of NSF and other government agencies. In addition to the authors, a number of other people have contributed to the contents of this report. In preparation for the original workshop, all doctorate-granting computer science departments in the nation were asked for comments and suggestions on the problems of experimental computer science. A version of the current report dated January 15 was circulated to these departments and to a number of industrial and government groups for criticism. The editors and authors of this final version gratefully acknowledge the contribution of a large number of other people at all stages in the preparation of the report. \par Note: Following this presentation of the report, there is a position paper on the crisis in experimental computer science written by the ACM Executive Committee.", 25888 acknowledgement = ack-nhfb, 25889 classcodes = "C0220 (Computing education and training)", 25890 corpsource = "Univ. of Rochester, Rochester, NY, USA", 25891 keywords = "capital equipment; computer science education; experimental computer science; investment; universities", 25892 treatment = "G General Review", 25893} 25894 25895@Article{McCracken:1979:AAE, 25896 author = "Daniel D. {McCracken, CCP} and Peter J. Denning and David H. Brandin", 25897 title = "Addendum: An {ACM} Executive Committee Position on the Crisis in Experimental Computer Science", 25898 journal = j-CACM, 25899 volume = "22", 25900 number = "9", 25901 pages = "503--504", 25902 month = sep, 25903 year = "1979", 25904 CODEN = "CACMA2", 25905 ISSN = "0001-0782", 25906 bibdate = "Sat Jan 18 15:46:13 1997", 25907} 25908 25909@Article{Galil:1979:IWC, 25910 author = "Zvi Galil", 25911 title = "On Improving the Worse Case Running Time of the {Boyer-Moore} String Matching Algorithm", 25912 journal = j-CACM, 25913 volume = "22", 25914 number = "9", 25915 pages = "505--508", 25916 month = sep, 25917 year = "1979", 25918 CODEN = "CACMA2", 25919 ISSN = "0001-0782", 25920 MRclass = "68H05 (68C25)", 25921 MRnumber = "80m:68083", 25922 mrreviewer = "Andrew Yao", 25923 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25924 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 25925 acknowledgement = ack-nhfb, 25926 annote = "It compares the pattern with the text from the right end of the pattern. Whenever a mismatch occurs, it shifts the pattern according to a precomputed table. In the case that the text character positioned against the last character in the pattern does not appear in the pattern, we can immediately shift the pattern right a distance equal to the size of the pattern. Thus, we need to inspect only about $n/m$ characters of the text (where $n$ and $m$ are the sizes of the text pattern).", 25927 classcodes = "C4240 (Programming and algorithm theory); C6130 (Data handling techniques)", 25928 corpsource = "Tel-Aviv Univ., Tel-Aviv, Israel", 25929 keywords = "algorithm; computational complexity; data handling; running time; string matching; worst case", 25930 treatment = "T Theoretical or Mathematical", 25931} 25932 25933@Article{Raiha:1979:OIA, 25934 author = "Kari-Jouko R{\"a}ih{\"a} and Stuart H. Zweben", 25935 title = "An Optimal Insertion Algorithm for One-Sided Height-Balanced Binary Search Trees", 25936 journal = j-CACM, 25937 volume = "22", 25938 number = "9", 25939 pages = "508--512", 25940 month = sep, 25941 year = "1979", 25942 CODEN = "CACMA2", 25943 ISSN = "0001-0782", 25944 MRclass = "68C25 (68E10)", 25945 MRnumber = "80h:68044", 25946 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25947 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib", 25948 abstract = "An algorithm for inserting an element into a one-sided height-balanced (OSHB) binary search tree is presented. The algorithm operates in time $O(\log n)$, where $n$ is the number of nodes in the tree. This represents an improvement over the best previous ly known insertion algorithms of Hirschberg and Kosaraju, which require time $O(\log 2n)$. Moreover, the $O(\log n)$ complexity is optimal. Earlier results have shown that deletion in such a structure can also be performed in $O(\log n)$ time. Thus the result of this paper gives a negative answer to the question of whether such trees should be the first examples of their kind, where deletion has a smaller time complexity than insertion. Furthermore, it can now be concluded that insertion, deletion, and retrieval in OSHB trees can be performed in the same time as the corresponding operations for the more general AVL trees, to within a constant factor. However, the insertion and deletion algorithms for OSHB trees appear much more complicated than the corresponding algorithms for AVL trees.", 25949 acknowledgement = ack-nhfb, 25950 annote = "An algorithm for inserting an element into a one-sided height-balanced (OSHB) binary search tree is presented. The algorithm operates in time $O(\log{N})$, where $N$ is the number of nodes in the tree. This represents an improvement over the best previously known insertion algorithms of Hirschberg and Kosaraju, which require time $O(\log{N}\log{N})$.", 25951 classcodes = "C4240 (Programming and algorithm theory); C6130 (Data handling techniques)", 25952 corpsource = "Univ. of Helsinki, Helsinki, Finland", 25953 country = "USA", 25954 descriptors = "Method; information system; search tree; graph theory;", 25955 enum = "2486", 25956 keywords = "binary; binary trees; data handling; height balanced; height-balanced trees; Insertion; insertion algorithm; one; one-sided height-balanced trees; optimal; search trees; search trees.; sided", 25957 language = "English", 25958 references = "13", 25959 treatment = "T Theoretical or Mathematical", 25960} 25961 25962@Article{Hansen:1979:PAD, 25963 author = "Wilfred J. Hansen", 25964 title = "Progressive acyclic digraphs --- a tool for database integrity", 25965 journal = j-CACM, 25966 volume = "22", 25967 number = "9", 25968 pages = "513--518", 25969 month = sep, 25970 year = "1979", 25971 CODEN = "CACMA2", 25972 ISSN = "0001-0782", 25973 MRclass = "68B15 (68C05)", 25974 MRnumber = "80h:68011", 25975 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25976 acknowledgement = ack-nhfb, 25977 classcodes = "C1160 (Combinatorial mathematics); C4240 (Programming and algorithm theory); C6160 (Database management systems (DBMS))", 25978 corpsource = "Univ. of Illinois, Urbana, IL, USA", 25979 keywords = "database integrity; database management systems; directed graphs; progressive acyclic digraph", 25980 treatment = "T Theoretical or Mathematical", 25981} 25982 25983@Article{Nagy:1979:APM, 25984 author = "G. Nagy and S. G. Wagle", 25985 title = "Approximation of Polygonal Maps by Cellular Maps", 25986 journal = j-CACM, 25987 volume = "22", 25988 number = "9", 25989 pages = "518--525", 25990 month = sep, 25991 year = "1979", 25992 CODEN = "CACMA2", 25993 ISSN = "0001-0782", 25994 bibdate = "Tue Mar 25 13:26:09 MST 1997", 25995 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.79.bib", 25996 acknowledgement = ack-nhfb, 25997 classcodes = "C6120 (File organisation); C7340 (Geophysics computing)", 25998 corpsource = "Univ. of Nebraska, Lincoln, NE, USA", 25999 keywords = "and Applications; approximation; cartography; cellular maps; data structure; data structures; geographical; mathematical aspects; polygonal maps", 26000 treatment = "A Application; T Theoretical or Mathematical", 26001 xxauthor = "G. Nagy and G. Wagle", 26002} 26003 26004@Article{Chan:1979:CSD, 26005 author = "T. F. Chan and J. G. Lewis", 26006 title = "Computing standard deviations: accuracy", 26007 journal = j-CACM, 26008 volume = "22", 26009 number = "9", 26010 pages = "526--531", 26011 month = sep, 26012 year = "1979", 26013 CODEN = "CACMA2", 26014 ISSN = "0001-0782", 26015 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26016 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib", 26017 abstract = "Four algorithms for the numerical computation of the standard deviation of (unweighted) sampled data are analyzed. Two of the algorithms are well-known in the statistical and computational literature; the other two are new algorithms specifically intended for automatic computation. Our discussion is expository, with emphasis on reaching a suitable definition of ``accuracy.'' Each of the four algorithms is analyzed for the conditions under which it will be accurate. We conclude that all four algorithms will provide accurate answers for many problems, but two of the algorithms, one new, one old, are substantially more accurate on difficult problems than are the other two.", 26018 acknowledgement = ack-nhfb, 26019 classcodes = "C1140Z (Other topics in statistics); C7310 (Mathematics computing)", 26020 corpsource = "Stanford Univ., Stanford, CA, USA", 26021 country = "USA", 26022 descriptors = "Expectation; standard deviation; moment estimation; numerical method; comparison; runtime/storage efficiency; rounding error; computer arithmetic;", 26023 enum = "515", 26024 keywords = "accuracy; condition number.; least squares; Mean; numerical computation; rounding error analysis; sampled data; standard deviation; standard deviations; statistics; updating estimates", 26025 language = "English", 26026 references = "11", 26027 treatment = "A Application; T Theoretical or Mathematical", 26028 xxtitle = "Computing Standard Deviation: Accuracy", 26029} 26030 26031@Article{West:1979:UMV, 26032 author = "D. H. D. West", 26033 title = "Updating mean and variance estimates: an improved method", 26034 journal = j-CACM, 26035 volume = "22", 26036 number = "9", 26037 pages = "532--535", 26038 month = sep, 26039 year = "1979", 26040 CODEN = "CACMA2", 26041 ISSN = "0001-0782", 26042 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26043 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib and ftp://ftp.ira.uka.de/pub/bibliography/Theory/Matrix.bib", 26044 abstract = "A method of improved efficiency is given for updating the mean and variance of weighted sampled data when an additional data value is included in the set. Evidence is presented that the method is stable and at least as accurate as the best existing updating method.", 26045 acknowledgement = ack-nhfb, 26046 annote = "A method of improved efficiency is given for updating the mean and variance of weighted sampled data when an additional data value is included in the set. Evidence is presented that the method is stable and at least as accurate as the best existing updating method.", 26047 classcodes = "C1140Z (Other topics in statistics); C7310 (Mathematics computing)", 26048 corpsource = "Univ. of Dublin, Dublin, Ireland", 26049 country = "USA", 26050 descriptors = "Expectation; standard deviation; moment estimation; numerical method; comparison; runtime/storage efficiency; variance;", 26051 enum = "3271", 26052 keywords = "efficiency; estimates; mean; Mean; removing data; sampled data; standard deviation; statistics; updating; updating estimates; variance; weighted", 26053 kwds = "mean, standard deviation, variance, updating", 26054 language = "English", 26055 references = "7", 26056 treatment = "A Application; T Theoretical or Mathematical", 26057} 26058 26059@Article{Laird:1979:COE, 26060 author = "P. D. Laird", 26061 title = "Comment on: {``An optimal evaluation of Boolean expressions in an online query system'' [Comm. ACM, 20, 1977, no. 5, 344--347, MR 55 \#9627] by M. Z. Hanani}", 26062 journal = j-CACM, 26063 volume = "22", 26064 number = "10", 26065 pages = "549--550", 26066 month = oct, 26067 year = "1979", 26068 CODEN = "CACMA2", 26069 ISSN = "0001-0782", 26070 MRclass = "68H05 (68B15)", 26071 MRnumber = "81b:68118", 26072 mrreviewer = "K. H. V. Booth", 26073 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26074 acknowledgement = ack-nhfb, 26075 classcodes = "C6120 (File organisation); C7250L (Non-bibliographic retrieval systems)", 26076 corpsource = "Shared Medical Systems Corp., King of Prussia, PA, USA", 26077 keywords = "Boolean expressions; Boolean functions; file organisation; information; information retrieval; online query system; retrieval", 26078 treatment = "T Theoretical or Mathematical", 26079} 26080 26081@Article{Gudes:1979:NOE, 26082 author = "Ehud Gudes and Anthony Hoffman", 26083 title = "A note on: {``An optimal evaluation of Boolean expressions in an online query system'' [Comm. ACM, 20, 1977, no. 5, 344--347, MR 55 \#9627] by M. Z. Hanani}", 26084 journal = j-CACM, 26085 volume = "22", 26086 number = "10", 26087 pages = "550--553", 26088 month = oct, 26089 year = "1979", 26090 CODEN = "CACMA2", 26091 ISSN = "0001-0782", 26092 MRclass = "68H05", 26093 MRnumber = "80k:68085", 26094 mrreviewer = "K. H. V. Booth", 26095 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26096 acknowledgement = ack-nhfb, 26097 classcodes = "C7250L (Non-bibliographic retrieval systems)", 26098 corpsource = "Pennsylvania State Univ., University Park, PA, USA", 26099 keywords = "Boolean expressions; Boolean functions; information retrieval; online query system", 26100 treatment = "P Practical", 26101} 26102 26103@Article{Anderson:1979:CCP, 26104 author = "M. R. Anderson and M. G. Anderson", 26105 title = "Corrigendum: {``Comments on Perfect Hashing Functions: A Single Probe Retrieving Method for Static Sets''}", 26106 journal = j-CACM, 26107 volume = "22", 26108 number = "10", 26109 pages = "553", 26110 month = oct, 26111 year = "1979", 26112 CODEN = "CACMA2", 26113 ISSN = "0001-0782", 26114 bibdate = "Wed Dec 27 08:06:10 1995", 26115 note = "Corrects \cite{Anderson:1979:CPH}.", 26116 acknowledgement = ack-nhfb, 26117} 26118 26119@Article{Lamport:1979:PCC, 26120 author = "Leslie Lamport", 26121 title = "On the Proof of Correctness of a Calendar Program", 26122 journal = j-CACM, 26123 volume = "22", 26124 number = "10", 26125 pages = "554--556", 26126 month = oct, 26127 year = "1979", 26128 CODEN = "CACMA2", 26129 ISSN = "0001-0782", 26130 MRclass = "68B10", 26131 MRnumber = "80f:68017", 26132 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26133 acknowledgement = ack-nhfb, 26134 classcodes = "C4240 (Programming and algorithm theory)", 26135 corpsource = "SRI Internat., Menlo Part, CA, USA", 26136 keywords = "calendar program; correctness; formal specification; programming theory; proof", 26137 treatment = "T Theoretical or Mathematical", 26138} 26139 26140@Article{Klint:1979:LNM, 26141 author = "Paul Klint", 26142 title = "Line Numbers Made Cheap", 26143 journal = j-CACM, 26144 volume = "22", 26145 number = "10", 26146 pages = "557--559", 26147 month = oct, 26148 year = "1979", 26149 CODEN = "CACMA2", 26150 ISSN = "0001-0782", 26151 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26152 acknowledgement = ack-nhfb, 26153 classcodes = "C6110 (Systems analysis and programming)", 26154 corpsource = "Math. Centrum, Amsterdam, Netherlands", 26155 keywords = "execution; line number administration; programming", 26156 treatment = "P Practical", 26157} 26158 26159@Article{Lozano-Perez:1979:APC, 26160 author = "Tom{\'a}s Lozano-P{\'e}rez and Michael A. Wesley", 26161 title = "An Algorithm for Planning Collision-Free Paths Among Polyhedral Obstacles", 26162 journal = j-CACM, 26163 volume = "22", 26164 number = "10", 26165 pages = "560--570", 26166 month = oct, 26167 year = "1979", 26168 CODEN = "CACMA2", 26169 ISSN = "0001-0782", 26170 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26171 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/imager/imager.79.bib", 26172 acknowledgement = ack-nhfb, 26173 classcodes = "C7490 (Computing in other engineering fields)", 26174 corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", 26175 keywords = "algorithmic aspects; collision avoidance algorithm; collision free; digital simulation; forbidden positions; intersection; intersection determination; network; path; path planning; polyhedral obstacles; representation of objects; safe; solids; three-dimensional graphics; vertex", 26176 ref = "VV35", 26177 treatment = "P Practical; T Theoretical or Mathematical", 26178} 26179 26180@Article{Morris:1979:CGC, 26181 author = "F. L. Morris", 26182 title = "On a Comparison of Garbage Collection Techniques", 26183 journal = j-CACM, 26184 volume = "22", 26185 number = "10", 26186 pages = "571", 26187 month = oct, 26188 year = "1979", 26189 CODEN = "CACMA2", 26190 ISSN = "0001-0782", 26191 bibdate = "Wed Sep 21 22:40:09 1994", 26192 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Compiler/garbage.collection.bib", 26193} 26194 26195@Article{Mayer:1979:PLB, 26196 author = "R. E. Mayer", 26197 title = "A psychology of learning {BASIC}", 26198 journal = j-CACM, 26199 volume = "22", 26200 number = "11", 26201 pages = "589--593", 26202 month = nov, 26203 year = "1979", 26204 CODEN = "CACMA2", 26205 ISSN = "0001-0782", 26206 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26207 acknowledgement = ack-nhfb, 26208 classcodes = "C0220 (Computing education and training); C6110 (Systems analysis and programming); C6140D (High level languages)", 26209 corpsource = "Univ. of California, Santa Barbara, CA, USA", 26210 keywords = "BASIC; computer science education; prestatement; programming; transaction", 26211 treatment = "T Theoretical or Mathematical", 26212} 26213 26214@Article{Morris:1979:PSC, 26215 author = "R. Morris and K. Thompson", 26216 title = "Password Security --- {A} Case History", 26217 journal = j-CACM, 26218 volume = "22", 26219 number = "11", 26220 pages = "594--597", 26221 month = nov, 26222 year = "1979", 26223 CODEN = "CACMA2", 26224 ISSN = "0001-0782", 26225 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26226 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib and ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib", 26227 acknowledgement = ack-nhfb, 26228 classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", 26229 corpsource = "Bell Labs., Murray Hill, NJ, USA", 26230 keywords = "operating systems (computers); OS; password security scheme; remotely accessed time sharing; security of data; system; UNIX ATT operating CACM", 26231 ort = "ordner sicherheit", 26232 treatment = "A Application; G General Review", 26233} 26234 26235@Article{Peleg:1979:BSC, 26236 author = "Shmuel Peleg and Azriel Rosenfeld", 26237 title = "Breaking Substitution Ciphers Using a Relaxation Algorithm", 26238 journal = j-CACM, 26239 volume = "22", 26240 number = "11", 26241 pages = "598--605", 26242 month = nov, 26243 year = "1979", 26244 CODEN = "CACMA2", 26245 ISSN = "0001-0782", 26246 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26247 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib", 26248 acknowledgement = ack-nhfb, 26249 classcodes = "C1230 (Artificial intelligence)", 26250 corpsource = "Univ. of Maryland, College Park, MD, USA", 26251 keywords = "artificial intelligence; computer security; cryptography; decoding; joint letter probabilities; letters; plaintext; relaxation; relaxation algorithm; substitution ciphers; updating scheme", 26252 ort = "ordner sicherheit", 26253 treatment = "T Theoretical or Mathematical", 26254} 26255 26256@Article{Tarjan:1979:SST, 26257 author = "Robert Endre Tarjan and Andrew Chi Chih Yao", 26258 title = "Storing a Sparse Table", 26259 journal = j-CACM, 26260 volume = "22", 26261 number = "11", 26262 pages = "606--611", 26263 month = nov, 26264 year = "1979", 26265 CODEN = "CACMA2", 26266 ISSN = "0001-0782", 26267 MRclass = "68B15 (68H05)", 26268 MRnumber = "81e:68019", 26269 mrreviewer = "Armin Cremers", 26270 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26271 acknowledgement = ack-nhfb, 26272 classcodes = "C6120 (File organisation)", 26273 corpsource = "Stanford Univ., Stanford, CA, USA", 26274 keywords = "hashing; LR parsing tables; sparse table; static table; storage allocation", 26275 treatment = "P Practical; T Theoretical or Mathematical", 26276} 26277 26278@Article{Shamir:1979:HSS, 26279 author = "Adi Shamir", 26280 title = "How to Share a Secret", 26281 journal = j-CACM, 26282 volume = "22", 26283 number = "11", 26284 pages = "612--613", 26285 month = nov, 26286 year = "1979", 26287 CODEN = "CACMA2", 26288 ISSN = "0001-0782", 26289 MRclass = "94B99 (68E99)", 26290 MRnumber = "80g:94070", 26291 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26292 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib and ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib", 26293 acknowledgement = ack-nhfb, 26294 annote = "protection against loss of keys by dividing the data into pieces.", 26295 classcodes = "C6130 (Data handling techniques)", 26296 corpsource = "MIT, Cambridge, MA, USA", 26297 keywords = "computer security; cryptographic systems; cryptography; encoding; key management; robust key management schemes; security breaches; security of data", 26298 ort = "ordner sicherheit", 26299 treatment = "P Practical; T Theoretical or Mathematical", 26300} 26301 26302@Article{Lipis:1979:CCU, 26303 author = "A. H. Lipis", 26304 title = "Costs of the current {US} payments system", 26305 journal = j-CACM, 26306 volume = "22", 26307 number = "12", 26308 pages = "644--647", 26309 month = dec, 26310 year = "1979", 26311 CODEN = "CACMA2", 26312 ISSN = "0001-0782", 26313 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26314 acknowledgement = ack-nhfb, 26315 classcodes = "C7120 (Financial computing)", 26316 corpsource = "Electronic Banking Inc., Atlanta, GA, USA", 26317 keywords = "banking industry; cash; credit cards; EFT; EFT transactions; EFTS; systems", 26318 treatment = "E Economic; P Practical", 26319} 26320 26321@Article{Long:1979:PPE, 26322 author = "R. H. Long", 26323 title = "Public protection and education with {EFT}", 26324 journal = j-CACM, 26325 volume = "22", 26326 number = "12", 26327 pages = "648--654", 26328 month = dec, 26329 year = "1979", 26330 CODEN = "CACMA2", 26331 ISSN = "0001-0782", 26332 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26333 acknowledgement = ack-nhfb, 26334 classcodes = "C0230 (Economic, social and political aspects of computing); C7120 (Financial computing)", 26335 corpsource = "Bank Administration Inst., Park Ridge, IL, USA", 26336 keywords = "consumers; education; EFT; EFTS; social aspects of automation", 26337 treatment = "P Practical", 26338} 26339 26340@Article{Parker:1979:VEI, 26341 author = "D. B. Parker", 26342 title = "Vulnerabilities of {EFTs} to intentionally caused losses", 26343 journal = j-CACM, 26344 volume = "22", 26345 number = "12", 26346 pages = "654--660", 26347 month = dec, 26348 year = "1979", 26349 CODEN = "CACMA2", 26350 ISSN = "0001-0782", 26351 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26352 acknowledgement = ack-nhfb, 26353 classcodes = "C0230 (Economic, social and political aspects of computing); C7120 (Financial computing)", 26354 corpsource = "SRI Internat., Menlo Park, CA, USA", 26355 keywords = "back-up requirements; business crimes; economics; EFTs; EFTS; electronic funds transfer systems; legislative actions; security; security of data", 26356 treatment = "P Practical", 26357} 26358 26359@Article{Kraemer:1979:PVE, 26360 author = "K. L. Kraemer and K. Colton", 26361 title = "Policy, values, and {EFT} research: anatomy of a research agenda", 26362 journal = j-CACM, 26363 volume = "22", 26364 number = "12", 26365 pages = "660--671", 26366 month = dec, 26367 year = "1979", 26368 CODEN = "CACMA2", 26369 ISSN = "0001-0782", 26370 bibdate = "Tue Mar 25 13:26:09 MST 1997", 26371 acknowledgement = ack-nhfb, 26372 classcodes = "C0230 (Economic, social and political aspects of computing); C7120 (Financial computing)", 26373 corpsource = "Univ. of California, Irvine, CA, USA", 26374 keywords = "American society; EFT research; EFTS; social aspects of automation", 26375 treatment = "B Bibliography; P Practical", 26376} 26377 26378@Article{Shoch:1979:MPE, 26379 author = "J. F. Shoch and J. A. Hupp", 26380 title = "Measured Performance of an {ETHERNET} Local Network", 26381 journal = j-CACM, 26382 volume = "23", 26383 number = "12", 26384 pages = "711--721", 26385 month = dec, 26386 year = "1979", 26387 CODEN = "CACMA2", 26388 ISSN = "0001-0782", 26389 bibdate = "Sat Jan 18 15:47:21 1997", 26390 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1979.bib", 26391 country = "USA", 26392 descriptors = "LAN;", 26393 enum = "2893", 26394 language = "English", 26395 references = "0", 26396} 26397 26398@Article{Samet:1979:QMA, 26399 author = "Hanan Samet", 26400 title = "A quadtree medial axis transform", 26401 journal = j-CACM, 26402 volume = "26", 26403 number = "9", 26404 pages = "680--693", 26405 month = sep, 26406 year = "1979", 26407 CODEN = "CACMA2", 26408 ISSN = "0001-0782", 26409 bibdate = "Sat Jan 18 15:48:10 1997", 26410 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Graphics/siggraph/79.bib", 26411} 26412 26413@Article{Pearson:1990:FHV, 26414 author = "Peter K. Pearson", 26415 title = "Fast Hashing of Variable-Length Text Strings", 26416 journal = j-CACM, 26417 volume = "33", 26418 number = "6", 26419 pages = "677--680", 26420 month = jun, 26421 year = "1990", 26422 CODEN = "CACMA2", 26423 ISSN = "0001-0782", 26424 bibdate = "Sat Apr 06 08:06:41 1996", 26425 bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/protein.pattern.bib", 26426 abstract = "Tailored to variable-length text strings, this hashing function uses very little arithmetic and can be used where perfect hashing is desired.", 26427 acknowledgement = ack-nhfb, 26428 annote = "Based on exclusive OR (XOR).", 26429 comment = "A simple fast hashing algorithm is given for variable length text strings. Essentially an xor is done over all of the characters of the string and the result is the hash value. Some analysis is done and a practical implementation is reported on.", 26430 review = "ACM CR 9012-0958", 26431} 26432 26433@Article{Sunday:1990:VFS, 26434 author = "Daniel M. Sunday", 26435 title = "A Very Fast Substring Search Algorithm", 26436 journal = j-CACM, 26437 volume = "33", 26438 number = "8", 26439 pages = "132--142", 26440 month = aug, 26441 year = "1990", 26442 CODEN = "CACMA2", 26443 ISSN = "0001-0782", 26444 bibdate = "Tue Jan 09 09:26:55 1996", 26445 note = "See also \cite{Boyer:1977:FSS} and \cite{Knuth:1977:FPM}.", 26446 acknowledgement = ack-nhfb, 26447} 26448 26449@Article{Dittmer:1991:NFH, 26450 author = "I. Dittmer", 26451 title = "Note on Fast Hashing of Variable Length Text Strings", 26452 journal = j-CACM, 26453 volume = "34", 26454 number = "11", 26455 pages = "118", 26456 month = nov, 26457 year = "1991", 26458 CODEN = "CACMA2", 26459 ISSN = "0001-0782", 26460 bibdate = "Sun Jul 17 19:42:16 1994", 26461 note = "Points out that Pearson's hashing algorithm \cite{Pearson:1990:FHV} was discovered fourteen years earlier by this author \cite{Dittmer:1976:IEP}. See also comments in \cite{Savoy:1991:NFH,Litsios:1991:NFH,Pearson:1991:NFH}.", 26462} 26463 26464@Article{Savoy:1991:NFH, 26465 author = "Jacques Savoy", 26466 title = "Note on Fast Hashing of Variable Length Text Strings", 26467 journal = j-CACM, 26468 volume = "34", 26469 number = "11", 26470 pages = "118--119", 26471 month = nov, 26472 year = "1991", 26473 CODEN = "CACMA2", 26474 ISSN = "0001-0782", 26475 bibdate = "Tue Jul 19 17:58:09 1994", 26476 note = "Suggests an improvement to Pearson's hashing algorithm \cite{Pearson:1990:FHV} that avoids secondary clustering. Exhibits a key set for which Pearson's algorithm produces alarming clustering. See also comments in \cite{Dittmer:1991:NFH,Litsios:1991:NFH,Pearson:1991:NFH}.", 26477 acknowledgement = ack-nhfb, 26478} 26479 26480@Article{Litsios:1991:NFH, 26481 author = "James Litsios", 26482 title = "Note on Fast Hashing of Variable Length Text Strings", 26483 journal = j-CACM, 26484 volume = "34", 26485 number = "11", 26486 pages = "118--120", 26487 month = nov, 26488 year = "1991", 26489 CODEN = "CACMA2", 26490 ISSN = "0001-0782", 26491 bibdate = "Tue Jul 19 18:02:04 1994", 26492 note = "Suggests a simple extension of Pearson's hashing algorithm \cite{Pearson:1990:FHV} that supports non-character data. See also comments in \cite{Dittmer:1991:NFH,Savoy:1991:NFH,Pearson:1991:NFH}.", 26493 acknowledgement = ack-nhfb, 26494} 26495 26496%======================================================================= 26497% Cross-referenced entries come last. 26498 26499@Article{Pearson:1991:NFH, 26500 author = "Peter Pearson", 26501 title = "Note on Fast Hashing of Variable Length Text Strings", 26502 journal = j-CACM, 26503 volume = "34", 26504 number = "11", 26505 pages = "120", 26506 month = nov, 26507 year = "1991", 26508 CODEN = "CACMA2", 26509 ISSN = "0001-0782", 26510 bibdate = "Tue Jul 19 17:58:54 1994", 26511 note = "Responds to several comments \cite{Dittmer:1991:NFH,Litsios:1991:NFH,Savoy:1991:NFH} on the author's earlier paper \cite{Pearson:1990:FHV}.", 26512 acknowledgement = ack-nhfb, 26513} 26514 26515@Article{Knuth:1974:SPG, 26516 author = "Donald E. Knuth", 26517 title = "Structured Programming with {\bf go to} Statements", 26518 journal = j-COMP-SURV, 26519 volume = "6", 26520 number = "4", 26521 pages = "261--301", 26522 month = dec, 26523 year = "1974", 26524 CODEN = "CMSVAN", 26525 ISSN = "0360-0300", 26526 bibdate = "Sat Aug 27 10:36:49 1994", 26527 note = "Reprinted with revisions in {\sl Current Trends in Programming Methodology}, Raymond T. Yeh, ed., {\bf 1} (Englewood Cliffs, NJ: Prentice-Hall, 1977), 140--194; {\sl Classics in Software Engineering}, Edward Nash Yourdon, ed.\ (New York: Yourdon Press, 1979), 259--321. Reprinted with ``final'' revisions in \cite[pp. 17--89]{Knuth:1992:LP}. This paper is a response to \cite{Dijkstra:1968:GSC}.", 26528 acknowledgement = ack-nhfb, 26529} 26530 26531@Article{Graham:1976:FUL, 26532 author = "Susan L. Graham and Mark Wegman", 26533 title = "A Fast and Usually Linear Algorithm for Global Flow Analysis", 26534 journal = j-J-ACM, 26535 volume = "23", 26536 number = "1", 26537 pages = "172--202", 26538 month = jan, 26539 year = "1976", 26540 CODEN = "JACOAH", 26541 ISSN = "0004-5411", 26542 bibdate = "Wed Jan 15 18:12:53 MST 1997", 26543 bibsource = "Compendex database", 26544 abstract = "A new algorithm for global flow analysis on reducible graphs is presented. The algorithm is shown to treat a very general class of function spaces. For a graph of e edges, the algorithm has a worst-case time bound of 0(e log e) function operations. It is also shown that in programming terms, the number of operations is proportional to e plus the number of exits from program loops. Consequently a restriction to one-entry one-exit control structures guarantees linearity. The algorithm can be extended to yet larger classes of function spaces and graphs by relaxing the time bound. Examples are given of code improvement problems which can be solved using the algorithm.", 26545 acknowledgement = ack-nhfb, 26546 classification = "723; 921", 26547 journalabr = "J Assoc Comput Mach", 26548 keywords = "computer programming; mathematical programming", 26549} 26550 26551@Article{Brown:1972:CSC, 26552 author = "R. J. Brown", 26553 title = "Chromatic scheduling and the chromatic number problem", 26554 journal = j-MANAGEMENT-SCIENCE, 26555 volume = "19", 26556 pages = "451--463", 26557 year = "1972", 26558 CODEN = "MSCIAM", 26559 ISSN = "0025-1909", 26560 annote = "Implicit enumeration algorithm [not seen].", 26561} 26562 26563@Article{Knuth:1977:FPM, 26564 author = "Donald E. Knuth and J. H. Morris and V. R. Pratt", 26565 title = "Fast pattern matching in strings", 26566 journal = j-SIAM-J-COMPUT, 26567 volume = "6", 26568 number = "2", 26569 pages = "323--350", 26570 month = jun, 26571 year = "1977", 26572 CODEN = "SMJCAT", 26573 ISSN = "0097-5397", 26574 bibdate = "Tue Feb 6 05:29:37 1996", 26575 note = "See also \cite{Boyer:1977:FSS} and \cite{Sunday:1990:VFS}.", 26576} 26577 26578@Article{Tharp:1982:PTS, 26579 author = "A. L. Tharp and K.-C. Tai", 26580 title = "The practicality of text signatures for accelerating string searching", 26581 journal = j-SPE, 26582 volume = "12", 26583 number = "1", 26584 pages = "35--44", 26585 month = jan, 26586 year = "1982", 26587 CODEN = "SPEXBL", 26588 ISSN = "0038-0644", 26589 bibdate = "Tue Feb 06 05:30:19 1996", 26590 note = "Expands Harrison's work \cite{Harrison:1971:IST}.", 26591 acknowledgement = ack-nhfb, 26592} 26593 26594@Article{Skovgaard:1975:RBF, 26595 author = "Ove Skovgaard", 26596 title = "Remark on {``Algorithm 236: Bessel Functions of the First Kind [S17]''}", 26597 journal = j-TOMS, 26598 volume = "1", 26599 number = "3", 26600 pages = "282--284", 26601 month = sep, 26602 year = "1975", 26603 CODEN = "ACMSCU", 26604 ISSN = "0098-3500", 26605 bibdate = "Tue Feb 06 05:26:43 1996", 26606 note = "See \cite{Gautschi:1964:AAB}.", 26607 acknowledgement = ack-nhfb, 26608} 26609 26610@Article{Misra:1975:RG, 26611 author = "Jayadev Misra", 26612 title = "Remark on {``Algorithm 246: Graycode [Z]''}", 26613 journal = j-TOMS, 26614 volume = "1", 26615 number = "3", 26616 pages = "285--285", 26617 month = sep, 26618 year = "1975", 26619 CODEN = "ACMSCU", 26620 ISSN = "0098-3500", 26621 bibdate = "Tue Feb 06 05:25:57 1996", 26622 note = "See \cite{Boothroyd:1964:AAG,Er:1985:RG}.", 26623 acknowledgement = ack-nhfb, 26624} 26625 26626@Article{Feinstein:1975:RMT, 26627 author = "Robert Feinstein", 26628 title = "Remark on {``Algorithm 483: Masked Three-Dimensional Plot Program with Rotations [J6]''}", 26629 journal = j-TOMS, 26630 volume = "1", 26631 number = "9", 26632 pages = "285--285", 26633 month = sep, 26634 year = "1975", 26635 CODEN = "ACMSCU", 26636 ISSN = "0098-3500", 26637 bibdate = "Tue Feb 06 05:25:34 1996", 26638 note = "See \cite{Watkins:1974:AAM}.", 26639 acknowledgement = ack-nhfb, 26640} 26641 26642@Article{Boulton:1976:REP, 26643 author = "D. M. Boulton", 26644 title = "Remark on {``Algorithm 434: Exact Probabilities for $R\times{C}$ Contingency Tables [G2]''}", 26645 journal = j-TOMS, 26646 volume = "2", 26647 number = "1", 26648 pages = "108--108", 26649 month = mar, 26650 year = "1976", 26651 CODEN = "ACMSCU", 26652 ISSN = "0098-3500", 26653 bibdate = "Tue Feb 06 05:26:29 1996", 26654 note = "See \cite{March:1972:AAE}.", 26655 acknowledgement = ack-nhfb, 26656} 26657 26658@Article{Duta:1976:RVS, 26659 author = "Lucian D. Duta", 26660 title = "Remark on {``Algorithm 475: Visible Surface Plotting Program [J6]''}", 26661 journal = j-TOMS, 26662 volume = "2", 26663 number = "1", 26664 pages = "109--110", 26665 month = mar, 26666 year = "1976", 26667 CODEN = "ACMSCU", 26668 ISSN = "0098-3500", 26669 bibdate = "Tue Feb 06 05:26:59 1996", 26670 note = "See \cite{Wright:1974:VSP}.", 26671 acknowledgement = ack-nhfb, 26672} 26673 26674@Article{White:1976:RMS, 26675 author = "G. M. White and S. Goudreau and J. L. Legros", 26676 title = "Remark on {``Algorithm 479: A Minimal Spanning Tree Clustering Method [Z]''}", 26677 journal = j-TOMS, 26678 volume = "2", 26679 number = "1", 26680 pages = "110--111", 26681 month = mar, 26682 year = "1976", 26683 CODEN = "ACMSCU", 26684 ISSN = "0098-3500", 26685 bibdate = "Tue Feb 06 05:28:06 1996", 26686 note = "See \cite{Page:1974:AAM}.", 26687 acknowledgement = ack-nhfb, 26688} 26689 26690@Article{Pomeranz:1976:REC, 26691 author = "J. Pomeranz", 26692 title = "Remark on {``Algorithm 487: Exact Cumulative Distribution of the Kolmogorov-Smirnov Statistic for Small Samples [S14]''}", 26693 journal = j-TOMS, 26694 volume = "2", 26695 number = "1", 26696 pages = "111--111", 26697 month = mar, 26698 year = "1976", 26699 CODEN = "ACMSCU", 26700 ISSN = "0098-3500", 26701 bibdate = "Tue Feb 06 05:28:05 1996", 26702 note = "See \cite{Pomeranz:1974:AAE}.", 26703 acknowledgement = ack-nhfb, 26704} 26705 26706@Article{Morris:1976:RDF, 26707 author = "Robert Morris", 26708 title = "Remark on {``Algorithm 490: The Dilogarithm Function of a Real Argument [S22]''}", 26709 journal = j-TOMS, 26710 volume = "2", 26711 number = "1", 26712 pages = "112--112", 26713 month = mar, 26714 year = "1976", 26715 CODEN = "ACMSCU", 26716 ISSN = "0098-3500", 26717 bibdate = "Tue Feb 06 05:28:02 1996", 26718 note = "See \cite{Ginsberg:1975:AAD}.", 26719 acknowledgement = ack-nhfb, 26720} 26721 26722@Article{Pike:1976:RIB, 26723 author = "Malcolm C. Pike and Jennie SooHoo", 26724 title = "Remark on {``Algorithm 179: Incomplete Beta Ratio [S14]''}", 26725 journal = j-TOMS, 26726 volume = "2", 26727 number = "2", 26728 pages = "207--208", 26729 month = jun, 26730 year = "1976", 26731 CODEN = "ACMSCU", 26732 ISSN = "0098-3500", 26733 bibdate = "Tue Feb 06 05:28:04 1996", 26734 note = "See \cite{Ludwig:1963:AAI}.", 26735 acknowledgement = ack-nhfb, 26736} 26737 26738@Article{Anderson:1976:RIS, 26739 author = "Michael R. Anderson", 26740 title = "Remark on {``Algorithm 433: Interpolation and Smooth Curve Fitting Based on Local Procedures [E2]''}", 26741 journal = j-TOMS, 26742 volume = "2", 26743 number = "2", 26744 pages = "208--208", 26745 month = jun, 26746 year = "1976", 26747 CODEN = "ACMSCU", 26748 ISSN = "0098-3500", 26749 bibdate = "Tue Feb 06 05:26:36 1996", 26750 note = "See \cite{Akima:1972:AAI}.", 26751 acknowledgement = ack-nhfb, 26752} 26753 26754@Article{Davies:1976:RRF, 26755 author = "Alan M. Davies", 26756 title = "Remark on {``Algorithm 450: Rosenbrock Function Minimization [E4]''}", 26757 journal = j-TOMS, 26758 volume = "2", 26759 number = "3", 26760 pages = "300--301", 26761 month = sep, 26762 year = "1976", 26763 CODEN = "ACMSCU", 26764 ISSN = "0098-3500", 26765 bibdate = "Tue Feb 06 05:26:54 1996", 26766 note = "See \cite{MacHura:1973:AAR}.", 26767 acknowledgement = ack-nhfb, 26768} 26769 26770@Article{Brown:1976:RAS, 26771 author = "Theodore Brown", 26772 title = "Remark on {``Algorithm 489: The Algorithm SELECT --- for Finding the $i$th Smallest of $n$ Elements [M1]''}", 26773 journal = j-TOMS, 26774 volume = "2", 26775 number = "3", 26776 pages = "301--304", 26777 month = sep, 26778 year = "1976", 26779 CODEN = "ACMSCU", 26780 ISSN = "0098-3500", 26781 bibdate = "Tue Feb 06 05:26:24 1996", 26782 note = "See \cite{Floyd:1975:AAA}.", 26783 acknowledgement = ack-nhfb, 26784} 26785 26786@Article{Ito:1976:RIT, 26787 author = "M. R. Ito", 26788 title = "Remark on {``Algorithm 284: Interchange of Two Blocks of Data [K2]''}", 26789 journal = j-TOMS, 26790 volume = "2", 26791 number = "4", 26792 pages = "392--393", 26793 month = dec, 26794 year = "1976", 26795 CODEN = "ACMSCU", 26796 ISSN = "0098-3500", 26797 bibdate = "Tue Feb 06 05:27:37 1996", 26798 note = "See \cite{Fletcher:1966:AAI}.", 26799 acknowledgement = ack-nhfb, 26800} 26801 26802@Article{Lozy:1976:RCS, 26803 author = "Mohamed el Lozy", 26804 title = "Remark on {``Algorithm 299: Chi-Squared Integral [S15]''}", 26805 journal = j-TOMS, 26806 volume = "2", 26807 number = "4", 26808 pages = "393--395", 26809 month = dec, 26810 year = "1976", 26811 CODEN = "ACMSCU", 26812 ISSN = "0098-3500", 26813 bibdate = "Tue Feb 06 05:28:00 1996", 26814 note = "See \cite{Hill:1967:AAC,Hill:1985:RCS}.", 26815 acknowledgement = ack-nhfb, 26816} 26817 26818@Article{Koppelaar:1976:RNI, 26819 author = "Henk Koppelaar and Peter Molenaar", 26820 title = "Remark on {``Algorithm 486: Numerical Inversion of Laplace Transform [D5]''}", 26821 journal = j-TOMS, 26822 volume = "2", 26823 number = "4", 26824 pages = "395--396", 26825 month = dec, 26826 year = "1976", 26827 CODEN = "ACMSCU", 26828 ISSN = "0098-3500", 26829 bibdate = "Tue Feb 06 05:27:48 1996", 26830 note = "See \cite{Veillon:1974:AAN}.", 26831 acknowledgement = ack-nhfb, 26832} 26833 26834@Article{Cate:1977:AAS, 26835 author = "Esko G. Cate and David W. Twigg", 26836 title = "Algorithm 513: Analysis of In-Situ Transposition [{F1}]", 26837 journal = j-TOMS, 26838 volume = "3", 26839 number = "1", 26840 pages = "104--110", 26841 month = mar, 26842 year = "1977", 26843 CODEN = "ACMSCU", 26844 ISSN = "0098-3500", 26845 bibdate = "Tue Feb 06 05:28:07 1996", 26846 acknowledgement = ack-nhfb, 26847} 26848 26849@Article{Veillon:1977:RNI, 26850 author = "Fran{\c{c}}oise Veillon", 26851 title = "Remark on {``Algorithm 486: Numerical Inversion of Laplace Transform''}", 26852 journal = j-TOMS, 26853 volume = "3", 26854 number = "1", 26855 pages = "111--111", 26856 month = mar, 26857 year = "1977", 26858 CODEN = "ACMSCU", 26859 ISSN = "0098-3500", 26860 bibdate = "Tue Feb 06 05:28:10 1996", 26861 note = "See \cite{Veillon:1974:AAN}.", 26862 acknowledgement = ack-nhfb, 26863} 26864 26865@Article{Jansen:1977:RLF, 26866 author = "J. K. M. Jansen", 26867 title = "Remark on {``Algorithm 259: Legendre Functions for Arguments Larger than One''}", 26868 journal = j-TOMS, 26869 volume = "3", 26870 number = "2", 26871 pages = "204--250", 26872 month = jun, 26873 year = "1977", 26874 CODEN = "ACMSCU", 26875 ISSN = "0098-3500", 26876 bibdate = "Tue Feb 06 05:28:08 1996", 26877 note = "See \cite{Gautschi:1965:AAL}.", 26878 acknowledgement = ack-nhfb, 26879} 26880 26881@Article{Sipala:1977:RAS, 26882 author = "Paolo Sipala", 26883 title = "Remark on {``Algorithm 408: A Sparse Matrix Package (Part I) [F4]''}", 26884 journal = j-TOMS, 26885 volume = "3", 26886 number = "3", 26887 pages = "303--303", 26888 month = sep, 26889 year = "1977", 26890 CODEN = "ACMSCU", 26891 ISSN = "0098-3500", 26892 bibdate = "Tue Feb 06 05:28:09 1996", 26893 note = "See \cite{McNamee:1971:AAS}.", 26894 acknowledgement = ack-nhfb, 26895} 26896 26897@Article{Tenney:1977:RAT, 26898 author = "Dennis Tenney", 26899 title = "Remark on {``Algorithm 219: Topological Ordering for PERT Networks''}", 26900 journal = j-TOMS, 26901 volume = "3", 26902 number = "3", 26903 pages = "303--303", 26904 month = sep, 26905 year = "1977", 26906 CODEN = "ACMSCU", 26907 ISSN = "0098-3500", 26908 bibdate = "Tue Feb 06 05:28:09 1996", 26909 note = "See \cite{Kase:1963:AAT}.", 26910 acknowledgement = ack-nhfb, 26911} 26912 26913@Article{Skovgaard:1978:RCE, 26914 author = "Ove Skovgaard", 26915 title = "Remark on {``Algorithm 149: Complete Elliptic Integral [S21]''}", 26916 journal = j-TOMS, 26917 volume = "4", 26918 number = "1", 26919 pages = "95--95", 26920 month = mar, 26921 year = "1978", 26922 CODEN = "ACMSCU", 26923 ISSN = "0098-3500", 26924 bibdate = "Tue Feb 06 05:28:13 1996", 26925 note = "See \cite{Merner:1962:AAC}.", 26926 acknowledgement = ack-nhfb, 26927} 26928 26929@Article{Coleman:1978:RAS, 26930 author = "John P. Coleman", 26931 title = "Remark on {``Algorithm 49: Spherical Neumann Function''}", 26932 journal = j-TOMS, 26933 volume = "4", 26934 number = "3", 26935 pages = "295--295", 26936 month = sep, 26937 year = "1978", 26938 CODEN = "ACMSCU", 26939 ISSN = "0098-3500", 26940 bibdate = "Tue Feb 06 05:28:11 1996", 26941 note = "See \cite{Herndon:1961:AAS}.", 26942 acknowledgement = ack-nhfb, 26943} 26944 26945@Article{Gustavson:1978:RAS, 26946 author = "Fred G. Gustavson", 26947 title = "Remark on {``Algorithm 408: A Sparse Matrix Package (Part I) [F4]''}", 26948 journal = j-TOMS, 26949 volume = "4", 26950 number = "3", 26951 pages = "295--295", 26952 month = sep, 26953 year = "1978", 26954 CODEN = "ACMSCU", 26955 ISSN = "0098-3500", 26956 bibdate = "Tue Feb 06 05:28:12 1996", 26957 note = "See \cite{McNamee:1971:AAS}.", 26958 acknowledgement = ack-nhfb, 26959} 26960 26961@Article{Schoene:1978:RMI, 26962 author = "Andrew Y. Schoene", 26963 title = "Remark on {``Algorithm 435: Modified Incomplete Gamma Function [S14]''}", 26964 journal = j-TOMS, 26965 volume = "4", 26966 number = "3", 26967 pages = "296--304", 26968 month = sep, 26969 year = "1978", 26970 CODEN = "ACMSCU", 26971 ISSN = "0098-3500", 26972 bibdate = "Tue Feb 06 05:28:12 1996", 26973 note = "See \cite{Fullerton:1972:AAM}.", 26974 acknowledgement = ack-nhfb, 26975} 26976 26977@Article{Lozy:1979:RSD, 26978 author = "Mohamed el Lozy", 26979 title = "Remark on {``Algorithm 395: Student's $t$-Distribution''} and Remark on {``Algorithm 396: Student's Quantiles [S14]''}", 26980 journal = j-TOMS, 26981 volume = "5", 26982 number = "2", 26983 pages = "238--239", 26984 month = jun, 26985 year = "1979", 26986 CODEN = "ACMSCU", 26987 ISSN = "0098-3500", 26988 bibdate = "Tue Feb 06 05:28:16 1996", 26989 note = "See \cite{Hill:1970:AASa,Hill:1970:AASb,Hill:1981:RSD,Hill:1985:RCS}.", 26990 acknowledgement = ack-nhfb, 26991} 26992 26993@Article{Geddes:1979:RCC, 26994 author = "K. O. Geddes", 26995 title = "Remark on {``Algorithm 424: Clenshaw-Curtis Quadrature [O1]''}", 26996 journal = j-TOMS, 26997 volume = "5", 26998 number = "2", 26999 pages = "240--240", 27000 month = jun, 27001 year = "1979", 27002 CODEN = "ACMSCU", 27003 ISSN = "0098-3500", 27004 bibdate = "Tue Feb 06 05:28:14 1996", 27005 note = "See \cite{Gentleman:1972:AAC}.", 27006 acknowledgement = ack-nhfb, 27007} 27008 27009@Article{Anderson:1979:RBI, 27010 author = "M. R. Anderson", 27011 title = "Remark on {``Algorithm 474: Bivariate Interpolation and Smooth Surface Fitting Based on Local Procedures''}", 27012 journal = j-TOMS, 27013 volume = "5", 27014 number = "2", 27015 pages = "241--241", 27016 month = jun, 27017 year = "1979", 27018 CODEN = "ACMSCU", 27019 ISSN = "0098-3500", 27020 bibdate = "Tue Feb 06 05:28:13 1996", 27021 note = "See \cite{Akima:1974:AAB}.", 27022 acknowledgement = ack-nhfb, 27023} 27024 27025@Article{Leathers:1979:RAS, 27026 author = "Burton L. Leathers", 27027 title = "Remark on {``Algorithm 513: Analysis of In-Situ Transposition [F1]''} and Remark on {``Algorithm 467: Matrix Transposition in Place''}", 27028 journal = j-TOMS, 27029 volume = "5", 27030 number = "4", 27031 pages = "520--520", 27032 month = dec, 27033 year = "1979", 27034 CODEN = "ACMSCU", 27035 ISSN = "0098-3500", 27036 bibdate = "Tue Feb 06 05:28:15 1996", 27037 note = "See \cite{Cate:1977:AAS,Brenner:1973:AAM}.", 27038 acknowledgement = ack-nhfb, 27039} 27040 27041@Article{Swieten:1979:RVS, 27042 author = "A. C. M. van Swieten and J. Th. M. de Hosson", 27043 title = "Remark on {``Algorithm 475: Visible Surface Plotting Program''}", 27044 journal = j-TOMS, 27045 volume = "5", 27046 number = "4", 27047 pages = "521--523", 27048 month = dec, 27049 year = "1979", 27050 CODEN = "ACMSCU", 27051 ISSN = "0098-3500", 27052 bibdate = "Tue Feb 06 05:28:16 1996", 27053 note = "See \cite{Wright:1974:VSP}.", 27054 acknowledgement = ack-nhfb, 27055} 27056 27057@Article{Harms:1980:RSM, 27058 author = "U. Harms and H. Kollakowski and G. M{\"{o}}ller", 27059 title = "Remark on {``Algorithm 408: A Sparse Matrix Package (Part 1) [F4]''}", 27060 journal = j-TOMS, 27061 volume = "6", 27062 number = "3", 27063 pages = "456--457", 27064 month = sep, 27065 year = "1980", 27066 CODEN = "ACMSCU", 27067 ISSN = "0098-3500", 27068 bibdate = "Tue Feb 06 05:28:17 1996", 27069 note = "See \cite{McNamee:1971:AAS}.", 27070 acknowledgement = ack-nhfb, 27071} 27072 27073@Article{Hill:1981:RSD, 27074 author = "G. W. Hill", 27075 title = "Remark on {``Algorithm 395: Student's $t$-Distribution''}", 27076 journal = j-TOMS, 27077 volume = "7", 27078 number = "2", 27079 pages = "247--249", 27080 month = jun, 27081 year = "1981", 27082 CODEN = "ACMSCU", 27083 ISSN = "0098-3500", 27084 bibdate = "Tue Feb 06 05:28:18 1996", 27085 note = "See \cite{Hill:1970:AASa,Hill:1970:AASb,Lozy:1979:RSD}.", 27086 acknowledgement = ack-nhfb, 27087} 27088 27089@Article{Hill:1981:RSQ, 27090 author = "G. W. Hill", 27091 title = "Remark on {``Algorithm 396: Student's $t$-Quantiles''}", 27092 journal = j-TOMS, 27093 volume = "7", 27094 number = "2", 27095 pages = "250--251", 27096 month = jun, 27097 year = "1981", 27098 CODEN = "ACMSCU", 27099 ISSN = "0098-3500", 27100 bibdate = "Tue Feb 06 05:28:19 1996", 27101 note = "See \cite{Hill:1970:AASb}.", 27102 acknowledgement = ack-nhfb, 27103} 27104 27105@Article{Hill:1985:RCS, 27106 author = "I. D. Hill and M. C. Pike", 27107 title = "Remark on {``Algorithm 299: Chi-Squared Integral''}", 27108 journal = j-TOMS, 27109 volume = "11", 27110 number = "2", 27111 pages = "185--185", 27112 month = jun, 27113 year = "1985", 27114 CODEN = "ACMSCU", 27115 ISSN = "0098-3500", 27116 bibdate = "Tue Feb 06 05:28:22 1996", 27117 note = "See \cite{Hill:1967:AAC,Lozy:1976:RCS}.", 27118 acknowledgement = ack-nhfb, 27119} 27120 27121@Article{Er:1985:RG, 27122 author = "M. C. Er", 27123 title = "Remark on {``Algorithm 246: Graycode [Z]''}", 27124 journal = j-TOMS, 27125 volume = "11", 27126 number = "4", 27127 pages = "441--443", 27128 month = dec, 27129 year = "1985", 27130 CODEN = "ACMSCU", 27131 ISSN = "0098-3500", 27132 bibdate = "Tue Feb 06 05:28:21 1996", 27133 note = "See \cite{Boothroyd:1964:AAG,Misra:1975:RG}.", 27134 acknowledgement = ack-nhfb, 27135} 27136 27137@Manual{ANSI:1966:AF, 27138 title = "{ANSI Fortran X3.9-1966}", 27139 organization = pub-ANSI, 27140 address = pub-ANSI:adr, 27141 pages = "??--??", 27142 year = "1966", 27143 bibdate = "Sat Jan 18 15:48:20 1997", 27144 note = "Approved March 7, 1966 (also known as Fortran 66). See also subsequent clarifications \cite{ANSI:1969:CFS} and \cite{ANSI:1971:CFS}.", 27145} 27146 27147@PhdThesis{deBalbine:1969:CAR, 27148 author = "Guy {de Balbine}", 27149 title = "Computational Analysis of the Random Components Induced by a Binary Equivalence Relation", 27150 type = "Ph.D. thesis", 27151 school = "California Institute of Technology", 27152 address = "Pasadena, CA, USA", 27153 pages = "168", 27154 year = "1969", 27155 bibdate = "Sat Feb 17 13:24:16 1996", 27156 note = "First use of second hash function for computing next hash table location after a collision.", 27157 abstract = "The problem of partitioning into classes by means of a binary equivalence relation is investigated. Several algorithms for determining the number of components in the graph associated with a particular set of elements are constructed and compared. When the classification process operates on independently-drawn samples of $n$ distinct elements from a population, the expected number of components is shown to be obtainable recursively for a class of problems called separable; in all cases, estimates are available to reach any desired level of accuracy. Clustering models in Euclidean space are analyzed in detail and asymptotic formulas obtained to complement experiments. Conjectures concerning the general behavior of the expected number of components are presented also. Finally, several computational tools of general interest are improved significantly.", 27158 acknowledgement = ack-nhfb, 27159 annote = "Abstract in Dissertation Abstracts, v30 n2 p645b 1969.", 27160} 27161 27162@InProceedings{Korman:1970:CO, 27163 author = "S. M. Korman", 27164 editor = "N. Christofides and A. Mingozzi and P. Toth and C. Sandi", 27165 booktitle = "Combinatorial Optimization", 27166 title = "The graph-colouring problem", 27167 publisher = "Wiley", 27168 address = "New York", 27169 pages = "211--235", 27170 year = "1970", 27171 annote = "Implicit enumeration algorithm [not seen].", 27172} 27173 27174@Book{Knuth:1973:ACP, 27175 author = "D. E. Knuth", 27176 title = "The Art of Computer Programming, Sorting and Searching", 27177 volume = "3", 27178 publisher = pub-AW, 27179 address = pub-AW:adr, 27180 pages = "xi + 723", 27181 year = "1973", 27182 ISBN = "0-201-03803-X", 27183 LCCN = "QA76.5 .K74", 27184 bibdate = "Wed Dec 15 15:47:47 1993", 27185 acknowledgement = ack-nhfb, 27186 annote = "Standardwerk ueber Suchen und Sortieren 5. Sorting 5.1. Combinatorial Properties of Permutations 5.2. Internal Sorting 5.3. Optimum Sorting 5.4. External Sorting 5.5. Summary, History, and Bibliography 6. Searching 6.1. Sequential Search 6.2. Searching By Comparison of Keys 6.3. Digital Searching 6.4. Hashing 6.5. Retrieval on Secondary Keys Answers to Exercises Appendix A: Tables of Numerical Quantities Appendix B: Index to Notations Index and Glossary.", 27187 annote2 = "A basic source for computational algorithms such as hashing (pp.506--568), search tree construction(pp.406--505), and some notes on disk performance evaluation (pp.361--371).", 27188 descriptor = "Algorithmus, B-baum, Baum, Binaer-baum, Gestreute Speicherung, Hash-verfahren, Mischen, Sortieren, Speicherung, Suchen, Zugriff", 27189} 27190 27191@MastersThesis{Dittmer:1976:IEP, 27192 author = "Ingo Dittmer", 27193 title = "{Implementation eines Einschrittcompilers f{\"u}r die Progammiersprache PASCAL auf der Rechenanlage IBM\slash 360 der Universit{\"a}t M{\"u}nster}. ({English} title: Implementation of a One-Step Compiler for the Programming Language {PASCAL} on the {IBM}\slash 360 of the {University of Muenster})", 27194 type = "Diplomearbeit", 27195 school = "Universit{\"a}t M{\"u}nster", 27196 address = "M{\"u}nster, Germany", 27197 pages = "??", 27198 month = "??", 27199 year = "1976", 27200 bibdate = "Sat Feb 17 13:24:29 1996", 27201 note = "Diplomearbeit M{\"u}nster 1976 und doert angegebene Literatur (English: Muenster diploma work 1976 and the literature cited therein). The hashing method was rediscovered fourteen years later by Pearson \cite{Pearson:1990:FHV}, and then commented on by several authors \cite{Dittmer:1991:NFH,Savoy:1991:NFH,Litsios:1991:NFH,Pearson:1991:NFH}.", 27202 acknowledgement = ack-nhfb, 27203 xxnote = "Cannot find in Dissertation Abstracts, European.", 27204} 27205 27206@Book{Knuth:1992:LP, 27207 author = "Donald E. Knuth", 27208 title = "Literate Programming", 27209 publisher = pub-SUCSLI, 27210 address = pub-SUCSLI:adr, 27211 pages = "xvi + 368", 27212 year = "1992", 27213 ISBN = "0-937073-80-6 (paperback), 0-937073-81-4 (hardcover)", 27214 LCCN = "QA76.6 .K644 1992", 27215 bibdate = "Fri Jul 22 09:08:14 1994", 27216 note = "Distributed by the University of Chicago Press.", 27217 price = "US\$24.95 (paperback), US\$59.95 (hardcover)", 27218 series = "CSLI Lecture Notes Number 27", 27219 acknowledgement = ack-nhfb, 27220} 27221