Sign In

Communications of the ACM

Table of Contents

ACM president's letter: H.R. 109

Operating system support for database management

Several operating system services are examined with a view toward their applicability to support of database management functions. These services include buffer pool management; the file system; scheduling, process management …

The proposed new Computing Reviews classification scheme

Report of the public cryptography study group

Representing super-sparse matrices with perturbed values

This paper describes a form of purposeful data perturbation in a linear programming model which pertains to uncertainties in the magnitudes of the matrix coefficients. A problem in value pool construction is described first,  …

Polynomial manipulation with APL

A simple but effective method for the manipulation of polynomials of several variables in APL is presented. The method is especially advantageous in situations where more sophisticated symbolic computing systems such as SAC-1 …

On the security of multiple encryption

Double encryption has been suggested to strengthen the Federal Data Encryption Standard (DES). A recent proposal suggests that using two 56-bit keys but enciphering 3 times (encrypt with a first key, decrypt with a second key …

Technical correspondence: on message passes in computer networks.

technical correspondence: on message passes in computer networks. author's response

ACM forum