Computing Applications
Some practical experience with a software quality assurance program
Control flow and data structure documentation: two experiments
Generating gamma variates by a modified rejection technique
DIAGRAM: a grammar for dialogues
Reciprocal hashing: a method for generating minimal perfect hashing functions
Analysis of future event set algorithms for discrete event simulation
An algorithm for exhaustive generation of building floor plans
A two-list synchronization procedure for discrete event simulation
A generalized user interface for applications programs
Microcomputers as remote nodes of a distributed system
Problems in application software maintenance
An experimental study of the human/computer interface
Authentication of signatures using public key encryption
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More