Security and Privacy
An algorithm for equivalence declarations
Operational compatability of systems—conventions
The state of digital computer technology in Europe
Design of an improved transmission/data processing code
An indirect chaining method for addressing on secondary keys
Comparison of iterative methods for the calculation of nth roots
Two subroutines for symbol manipulation with an algebraic compiler
Comment on a paper on parallel processing
The BKS system for the Philco-2000
A card format for reference files in information processing
Statistical programs at the University of North Carolina
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More