|
Journals in DBLP
Commun. ACM 1978, volume: 21, number: 12
- Roger M. Needham, Michael D. Schroeder
Using Encryption for Authentication in Large Networks of Computers. [Citation Graph (3, 0)][DBLP] Commun. ACM, 1978, v:21, n:12, pp:993-999 [Journal]
- David Gries, Jayadev Misra
A Linear Sieve Algorithm for Finding Prime Numbers. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1978, v:21, n:12, pp:999-1003 [Journal]
- James L. Peterson, James R. Bitner, John H. Howard
The Selection of Optimal Tab Settings. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1978, v:21, n:12, pp:1004-1007 [Journal]
- James C. Wetherbe, V. Thomas Dock
A Strategic Planning Methodology for the Computing Effort in Higher Education: An Empirical Evaluation. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1978, v:21, n:12, pp:1008-1015 [Journal]
- M. Ibramsha, V. Rajaraman
Detection of Logical Errors in Decition Table Programs. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1978, v:21, n:12, pp:1016-1025 [Journal]
- Alberto Martelli, Ugo Montanari
Optimizing Decision Trees Through Heuristically Guided Search. [Citation Graph (1, 0)][DBLP] Commun. ACM, 1978, v:21, n:12, pp:1025-1039 [Journal]
- Yogen K. Dalal, Robert Metcalfe
Reverse Path Forwarding of Broadcast Packets. [Citation Graph (2, 0)][DBLP] Commun. ACM, 1978, v:21, n:12, pp:1040-1048 [Journal]
- John V. Guttag, Ellis Horowitz, David R. Musser
Abstract Data Types and Software Validation. [Citation Graph (5, 0)][DBLP] Commun. ACM, 1978, v:21, n:12, pp:1048-1064 [Journal]
- Jay M. Spitzen, Karl N. Levitt, Lawrence Robinson
An Example of Hierarchical Design and Proof. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1978, v:21, n:12, pp:1064-1075 [Journal]
|