Volume 28,
Number 1,
January 1985
Special Section on Computer Architecture
Reports
- Jean E. Sammet, Robert W. Rector:
In Recognition of the 25th Anniversary of Computing Reviews.
53-68
- Jack Minker:
Computer Professionals Whose Scientific Freedom and Human Right Have Been Violated - 1984: A report of the ACM Commitee on Scientific Freedom and Human Rights.
69-78
Computing Practices
Research Contributions
Volume 28,
Number 2,
February 1985
Programming Pearls
Articles
- Phillip Ein-Dor:
Grosch's Law Re-Revisited: CPU Power and the Cost of Computation.
142-151
- Ronald S. Lemos:
Rating the Major Computing Periodicals on Readability.
152-157
1984 ACM Turing Award Lecture
- Niklaus Wirth:
From Programming Language Design to Computer Construction.
159-164
Computing Practices
Research Contributions
Volume 28,
Number 3,
March 1985
Programming Pearls
Articles
Reports
- A. Joe Turner:
Computer Science in Secondary Schools: Curriculum and Teacher Certification.
269-279
Computing Practices
Research Contributions
Volume 28,
Number 4,
April 1985
Special Section on Computing at the Frontiers of Theoretical Physics
Computing Practices
Research Contributions
Volume 28,
Number 5,
May 1985
Programming Pearls
Articles
Reports
- John Tartar:
The 1984 Snowbird Report: Future Issues in Computer Science.
490-493
Computer Practices
Research Contributions
Volume 28,
Number 6,
June 1985
Programming Pearls
Articles
Reports
Computer Practices
Research Contributions
Volume 28,
Number 7,
July 1985
Programming Pearls
Articles
- Starr Roxanne Hiltz, Murray Turoff:
Structuring Computer-Mediated Communication Systems to Avoid Information Overload.
680-689
- Mark Stefik:
Strategic Computing at DARPA: Overview and Assessment.
690-704 ,
Corrigendum:
CACM 28(8):
788 (1985)
Review
- Robert Papsdorf:
A Prescription for Computer Anxiety - Review of John Shore's "The Sachertorte Algorithm".
704-706
Computer Practices
- John A. Mills:
A Pragmatic View of the System Architect.
708-717
- Vaclav Rajlich:
Paradigms for Design and Implementation in Ada.
718-727
Research Contributions
- Kenneth C. Laudon:
Environmental and Institional Models of System Development: A National Criminal History System.
728-740
- W. David Kelton:
Transient Exponential-Erlang Queues and Steady-State Simulation.
741-749
Volume 28,
Number 8,
August 1985
Articles
Reports
Computing Practices
- J. M. Shearer, M. A. Wolfe:
ALGLIB, A Simple Symbol-Manipulation Package.
820-825
- Henry C. Smith:
Database Design: Composing Fully Normalized Tables from a Rigorous Dependency Diagram.
826-838
Research Contributions
Volume 28,
Number 9,
September 1985
Programming Pearls
Special Section on Architectures for Knowledge-Based Systems
Computing Practices
- Jürg Gutknecht:
Concepts of the Text Editor Lara.
942-960
- Gerard D. Finn:
Extended Use of Null Productions in LR(1) Parser Applications.
961-972
Research Contributions
Volume 28,
Number 10,
October 1985
Articles
- David Chaum:
Security Without Identification: Transaction Systems to Make Big Brother Obsolete.
1030-1044
- Gad Ariav, Michael J. Ginzberg:
DSS Design: A Systemic View of Decision Support.
1045-1052
Computing Practices
- Robert Mandl:
Orthogonal Latin Squares: An Application of Experiment Design to Compiler Testing.
1054-1058
- Bo Sanden:
Systems Programming with JSP: Example - A VDU Controller.
1059-1067
Research Contributions
- R. M. Norton, D. P. Yeager:
A Probability Model for Overflow Sufficiency in Small Hash Tables.
1068-1075
- Raj Jain, Imrich Chlamtac:
The P² Algorithm for Dynamic Calculation of Quantiiles and Histograms Without Storing Observations.
1076-1085
Volume 28,
Number 11,
November 1985
Programming Pearls
Computing in the Frontiers of Science and Engineering (CACM/IEEE-CS Computer Joint Issue)
Volume 28,
Number 12,
December 1985
Articles
Reports
Computing Practices
Research Contributions
Copyright © Fri Mar 12 17:24:53 2010
by Michael Ley (ley@uni-trier.de)