Conversational access to a 2048-word machine.
Comments on a paper by Lowe.
An interactive command generating facility.
Space/Time Trade-offs in Hash Coding with Allowable Errors.
The mobile programming system: STAGE2.
A note on data base deadlocks.
ACM president's letter: 100, 000 in 1975!
Note on an anomaly in paging.
A comment on axiomatic approaches to programming.
Context-sensitive parsing.
Certification of algorithm 385: Exponential integral Ei (x).
Algorithm 385: Exponential integral Ei(x).
Algorithm 386: Greatest common divisor of n integers and multipliers.
Remarks on Algorithm 332: Jacobi polynomials: Algorithm 344: student's t-distribution: Algorithm 351: modified Romberg quadrature: Algorithm 359: factoral analysis of variance.
File structures using hashing functions.
Algorithm and bound for the greatest common divisor of n integers.
Certification of algorithm 22: Ricatti-Bessel functions of first and second kind.