- Ira Pohl, J. J. Duby:
**Letters to the editor: Improved Hamiltonian Paths.**1

- Gerard Salton:
**Editorial: On the future of mechanical information files.**2

- Harold Sackman, W. J. Erikson, E. E. Grant:
**Exploratory experimental studies comparing online and offline programming performance.**3-11

- David R. Green:
**Algorithms: Algorithm 319: Triangular factors of modified matrices.**12

- Virginia W. Whitley:
**Certification of algorithm 196: Muller's method for finding roots of an arbitrary function.**12-14

- M. R. Hoare:
**Remark on algorithm 291: Logarithm of gamma function.**14

- J. K. S. McKay:
**Remark on algorithm 307: Symmetric group characters.**14

- Mark I. Halpern:
**Programming Languages: Toward a general processor for programming languages.**15-25

- David Gries:
**Use of transition matrices in compiling.**26-34

- W. D. Maurer:
**An Improved Hash Code for Scatter Storage.**35-37

- Robert Morris:
**Scatter Storage Techniques.**38-44

- Philip Rabinowitz:
**Numerical Analysis: Practical error coefficients for estimating quadrature errors for analytic functions.**45-46

- David W. Matula:
**In-and-out conversions.**47-50

- W. S. Meisel:
**A numerical integration formula useful in Fourier analysis.**51

- W. Morven Gentleman:
**Letters to the editor: Further comment on the computation of least squares polynomials.**73

- Bernard A. Galler:
**President's letter to the ACM membership.**74-76

- Jerome A. Feldman, David Gries:
**Translator writing systems.**77-113

- D. B. Hunter:
**Algorithms: Algorithm 320: Harmonic analysis for symmetrically distributed data.**114-115

- R. J. Ord-Smith:
**Algorithms: Algorithm 323: Generation of permutations in lexicographic order.**117

- G. Bayer:
**Algorithms: Algorithm 324: Maxflow.**117-118

- Gerhard Zielke:
**Algorithms: Algorithm 325: Adjustment of the inverse of a symmetric matrix when two symmetric elements are changed.**118

- R. J. Pankhurst:
**Operating Systems: Program overlay techniques.**119-125

- Edsger W. Dijkstra:
**Letters to the editor: go to statement considered harmful.**147-148

- Bernard A. Galler:
**Letters to the editor: Language protection by trademark ill-advised.**148

- J. Howlett:
**Letters to the editor: No trouble with Atlas I page-turning.**149

- John E. Howland:
**Letters to the editor: On practicality of sieving techniques vs. the sieving algorithm.**149

- Anton J. Van Reeken:
**Letters to the editor: Dealing with Neely's algorithms.**149-150

- B. E. Rodden:
**Letters to the editor: In defense of Langdon's algorithm.**150

- Donald R. Morrison:
**Letters to the editor: Abbreviations for computer and memory sizes.**150

- S. R. Clark:
**Letters to the editor: Endorsing the Illinois post mortem dump.**150

- William F. Atchison, Samuel D. Conte, John W. Hamblen, Thomas E. Hull, Thomas A. Keenan, William B. Kehl, Edward J. McCluskey, Silvio O. Navarro, Werner C. Rheinboldt, Earl J. Schweppe, William Viavant, David M. Young:
**Curriculum 68: Recommendations for academic programs in computer science: a report of the ACM curriculum committee on computer science.**151-197

- Donn B. Parker:
**Rules of ethics in information processing.**198-201

- Richard G. Canning:
**Goals for 1970.**220

- Bernard A. Galler:
**ACM: A coming of age.**221

- E. L. Harder:
**The expanding world of computers.**231-239

- Stephen H. Unger:
**A global parser for context-free phrase structure grammars.**240-247

- H. E. Kulsrud:
**Programming Languages: A general purpose graphic language.**247-254

- Richard Bellman, Harriet H. Kagiwada, Robert Kalaba, R. Vasudevan:
**Numerical Analysis: Quasilinearization and the estimation of differential operators from eigenvalues.**255-256

- John W. Hamblen:
**Education: Expenditures, sources of funds, and utilization of digital computers for research and instruction in higher education: 1964-65 with projections for 1968-69.**257-262

- Elliott I. Organick:
**Panel discussion on computer appreciation.**263-268

- Terence R. F. Nonweiler:
**Algorithms: Algorithm 326: Roots of low-order polynomial equations.**269-270

- K. S. Kölbig:
**Algorithms: Algorithm 327: Dilogarithm.**270-271

- A. Bergson:
**Algorithms: Certification of and remark on algorithm 304: Normal curve integral.**271

- G. Bayer:
**Algorithms: Remark on algorithm 293: Transportation problem.**271-272

- William M. O'Brien, Joan Wood:
**Algorithms: Certification of algorithm 299: Chi-squared integral.**271

- J. K. S. McKay:
**Algorithms: Remark on algorithm 305: Symmetric polynomials.**272

- E. L. Lohse:
**Standards: Proposed USA Standard: Data code for calendar date for machine-to-machine data interchange.**273-274

- E. L. Lohse:
**Hollerith punched card code.**275-281

- Lynn Yarbrough:
**Letters to the editor: on using a graphic input tablet.**294

- Brian Randell, C. J. Kuehner:
**Dynamic storage allocation systems.**297-306

- Robert C. Daley, Jack B. Dennis:
**Virtual Memory, Processes, and Sharing in MULTICS.**306-312

- G. Oppenheimer, N. Weizer:
**Resource management for a medium scale time-sharing operating system.**313-322

- Peter J. Denning:
**The Working Set Model for Program Behaviour.**323-333

- Kurt Fuchel:
**Considerations in the design of a multiple computer system with extended core storage.**334-340

- Edsger W. Dijkstra:
**The Structure of "THE"-Multiprogramming System.**341-346

- Butler W. Lampson:
**A scheduling philosophy for multiprocessing systems.**347-360

- Earl C. Van Horn:
**Three criteria for designing computing systems to facilitate debugging.**360-365

- Robert M. Graham:
**Protection in an information processing utility.**365-369

- Jack B. Dennis:
**A position paper on computing and communications.**370-377

- Russell J. Abbott:
**Letters to the editor: gathering of misleading data with little regard for privacy.**377-378

- J. D. Beyer, Ward Douglas Maurer, Frank K. Bamberger:
**Letters to the editor: Comments on "An Improved Hash Code for Scatter Storage".**378

- George G. Dodd:
**Letters to the editor: ACM a clearing house for computer acronyms?**378

- Christopher J. Shaw:
**Letters to the editor: on the development of a new common computer languages.**391

- Wallace Givens:
**Letters to the editor: proposed abbreviation for 1024: bK.**391

- E. J. Orth Jr.:
**Letters to the editor: Standardization of hand-coding needed for man-to-machine communication.**391

- Knut Bahr:
**Letters to the editor: An auxiliary program to analyze LISP 1.5 programs.**392

- Glen G. Langdon Jr.:
**Letters to the editor: Generating permutations by nested cycling.**392

- J. K. S. McKay:
**Letters to the editor: on the evalution of multiplicative combinatorial expressions.**392

- Richard H. Bartels, Gene H. Golub:
**Numerical Analysis: Stable numerical methods for obtaining the Chebyshev solution to an overdetermined system of equations.**401-406

- William C. Lynch:
**Computer Systems: Reliable full-duplex file transmission over half-duplex telephone line.**407-410

- T. H. Myer, Ivan E. Sutherland:
**On the design of display processors.**410-414

- D. Ophir, S. Rankowitz, Barry J. Shepherd, R. J. Spinrad:
**Scientific Applications: BRAD: the brookhaven raster display.**415-416

- Gary B. Anderson, David W. Rogers:
**An inexpensive braille terminal device.**417-418

- Ken Thompson:
**Regular Expression Search Algorithm.**419-422

- Paul T. Brady:
**Writing an online debugging program for the experienced user.**423-427

- Richard H. Bartels, Gene H. Golub:
**Algorithms: Algorithm 328: Chebyshev solution to an overdetermined linear system.**428-430

- Robert R. Fenichel:
**Algorithms: Algorithm 329: Distribution of indistinguishable objects into distinguishable slots.**430

- Ian Oliver:
**Algorithms: Algorithm 330: Factorial analysis of variance.**431-432

- Walter Gautschi:
**Algorithms: Algorithm 331: Gaussian quadrature formulas.**432-436

- Bruno F. W. Whitte:
**Algorithms: Algorithm 332: Jacobi polynomials.**436-437

- Rodolfo C. Salazar, Subrata K. Sen:
**Algorithms: Algorithm 333: MINIT algorithm for linear programming.**437-440

- E. L. Lohse:
**Standards: Heading format for data transmission (A USAAI) tutorial.**441-448

- Ivan E. Sutherland:
**A futures market in computer time.**449-451

- Edward G. Coffman Jr., L. C. Varian:
**Further experimental data on the behavior of programs in a paging environment.**471-474

- I. J. Good:
**Letters to the editor: number of possible strategies when writing compilers.**474

- Jaroslav Král:
**One way of estimating frequencies of jumps in a program.**475-480

- George Nagy:
**Preliminary investigation of techniques for automated reading of unformatted text.**480-487

- A. Wolinsky:
**A simple proof of Lewin's ordered-retrieval theorem for associative memories.**488-490

- A. J. Bayes:
**A generalized partial pass block sort.**491-492

- A. C. Fisher:
**Computer construction of project networks.**493-497

- René de Vogelaere:
**Remark on algorithm 178: Direct search.**498

- M. D. MacLaren:
**Remark on algorithm 272: Procedure for the normal distribution functions.**498

- James R. Bell:
**Algorithm 334: Normal random deviates.**498

- G. V. McWilliams, R. W. Thompson:
**Methods of convergence improvement for some improper integrals.**499-501

- H. K. Kuiken:
**Determination of the intersection points of two plane curves by means of differential equations.**502-506

- Roger W. Elliot:
**Master's level computer science curricula.**507-508

- Saul Stimler:
**A methodology for calculating and optimizing real-time system performance.**509-516

- John R. Ehrman:
**"Logical" arithmetic on computers with two's complement binary arithmetic.**517-520

- Donald L. Dietmeyer:
**Generating prime implicants via ternary encoding and decimal arithmetic.**520-523

- David Lorge Parnas:
**Letters to the editor: on improving the quality of our technical meetings.**537-538

- Jeffrey L. DeVeber:
**Letters to the editor: correction's to Stone's compiler procedures.**538

- John R. Rice, Edsger W. Dijkstra:
**Letters to the editor: The go to statement reconsidered.**538

- David F. Stevens:
**Operating Systems: On overcoming high-priority paralysis in multiprogramming systems: a case history.**539-541

- Peter C. Lockemann, W. Dale Knutsen:
**Information Retrieval: Recovery of disk contents after system failure.**542

- John F. Banzhaf:
**When your computer needs a lawyer.**543-549

- C. A. Lang, J. C. Gray:
**Programming Techniques: ASP - a ring implemented associative structure package.**550-555

- Harold J. Breaux:
**A modification of Efroymson's technique for stepwise regression analysis.**556-558

- Daniel G. Bobrow, Daniel L. Murphy:
**A note on the efficiency of a LISP computation in a paged machine.**558

- Charles Allan Hall, T. A. Porsching:
**Programming Languages: Generation of positive test matrices with known positive spectra.**559-560

- Edward F. Storm:
**CHAMP - character manipulation procedures.**561-566

- Edward F. Storm:
**CHAMP - character manipulation procedures.**561-566

- R. de Vogelaere:
**Algorithms: Algorithm 335: a set of basic input-output procedures.**567-573

- John F. Muth:
**Algorithms: Remark on algorithm 217: minimum excess cost curve.**573

- Calvin N. Mooers:
**Standards: Accommodating standards and identification of programming languages.**574-576

- Thomas B. Steel Jr.:
**Commentary on Mr. Mooers' paper.**576

- Mel Skinner:
**Letters to the editor: A tactical assault on systems procurement.**593

- G. A. Mapp:
**Proposed library of programs for personnel and related work.**593

- A. Kenneth Fitzgerald:
**Letters to the editor: on Congressman Brooks letter Re standardization.**593

- Jeffrey P. Krischer:
**Letters to the editor: On computer appreciation in the undergraduate curriculum.**594

- Richard K. Bennett:
**Letters to the editor: A base for language definition.**594

- Fred C. Hutton:
**Information Retrieval: PEEKABIT, computer offspring of punched card PEEKABOO, for natural language searching.**595-598

- Morris Rubinoff, Samuel Bergman, Winifred Franks, Elayne R. Rubinoff:
**Experimental evaluation of information retrieval through a teletypewriter.**598-604

- Peter J. Denning:
**Operating Systems: A statistical model for console behavior in multiuser computers.**605-612

- Hideyuki Hayashi, Sheila Duncan, Susumu Kuno:
**Computational Linguistics: Graphical input/output of nonstandard characters.**613-618

- B. L. Fox, D. M. Landi:
**Scientific Applications: An algorithm for identifying the ergodic subchains and transient states of a stochastic matrix.**619-621

- J. C. Dill, D. L. Randall, I. Richer:
**PLEXUS - an on-line system for modeling neural networks.**622-629

- G. D. Miller:
**Programming Techniques: An algorithm for the probability of the union of a large number of events.**630-631

- T. A. Bray, Christoph Witzgall:
**Algorithms: Algorithm 336: netflow.**631-633

- J. H. Henderson, R. M. Knapp, M. E. Volberding:
**Algorithms: Remark on algorithm 248: netflow.**633

- W. Pankiewicz:
**Algorithms: Algorithm 337: calculation of a polynomial and its derivative values by Horner scheme.**633

- T. A. Bray:
**Algorithms: Remark on algorithm 248: Netflow.**633

- Jan V. Garwick:
**Programming Languages: GPL, a truly general purpose language.**634-638

- G. W. Stewart, Dale W. Lick:
**Numerical Analysis: Numerical solution of a thin plate heat transfer problem.**639-640

- John R. B. Whittlesey:
**A comparison of the correlational behavior of random number generators for the IBM 360.**641-644

- Henry F. Fliegel, Thomas C. van Flandern:
**Letters to the editor: a machine algorithm for processing calendar dates.**657

- Harold Wooster:
**Letters to the editor: Do you use microfiche?**657-658

- Paul W. Abrahams:
**Letters to the editor: On "prime phrase" in Feldman and Gries paper.**657

- Bruce A. Martin:
**Letters to the editor: On binary notation.**658

- Raymond P. Wishner:
**Letters to the editor: comment on curriculum 68.**658

- Bernard A. Galler:
**President's letter to the ACM membership: involvement.**659

- L. B. Lesem, P. M. Hirsch, J. A. Jordan Jr.:
**Scientific Applications: Computer synthesis of Holograms for 3-D display.**661-674

- A. Schurmann:
**Business Applications: GAN, a system for generating and analyzing activity networks.**675-679

- Peter J. H. King:
**Ambiguity in limited entry decision tables.**680-684

- David F. Martin:
**Programming Languages: Boolean matrix methods for the detection of simple precedence grammars.**685-687

- Helen V. Braden, William A. Wulf:
**The implementation of a BASIC system in a multiprogramming environment.**688-692

- Morris Rubinoff, Samuel Bergman, F. Rapp, H. Cautin:
**Information Retrieval: Easy English, a language for information retrieval through a remote typewriter console.**693-696

- K. J. Engvold, J. L. Hughes:
**Education: A general-purpose display processing and tutorial system.**697-702

- Glenn D. Bergland:
**Numerical Analysis: A fast fourier transform algorithm for real-valued series.**703-710

- Bernard A. Galler:
**President's letter to the ACM membership: The ACM Council.**729

- Robert McNaughton:
**Automata, formal languages abstract switching, and computability in a Ph.D. computer science program.**738-740

- Jane G. Jodeit:
**Storage organization in programming systems.**741-746

- Sam F. Mendicino, Robert A. Hughes, Jeanne T. Martin, Frank H. McMahon, John E. Ranelletti, Richard G. Zwakenberg:
**The LRLTRAN compiler.**747-755

- Robert Korfhage:
**A note on a relevance estimate and its improvement.**756

- George Marsaglia, T. A. Bray:
**One-line random number generators and their use in combinations.**757-759

- Donald Greenspan:
**Approximate solution of initial-boundary wave equation problems by boundary-value techniques.**760-763

- Philip Rabinowitz:
**Practical error coefficients in the integration of periodic analytic functions by the trapezoidal rule.**764-765

- Daniel G. Bobrow, J. Bruce Fraser:
**A phonological rule tester.**766-772

- Richard C. Singleton:
**Algorithms: Algorithm 338: algol procedures for the fast Fourier transform.**773-776

- Richard C. Singleton:
**Algorithms: Algorithm 339: an algol procedure for the fast Fourier transform with arbitrary factors.**776-779

- Albert Noltemeier:
**Algorithms: Algorithm 340: roots of polynomials by a root-squaring and resultant routine.**779-782

- J. L. Byrne, Les G. Proll:
**Algorithms: Algorithm 341: solution of linear programs in 0-1 variables by implicit enumeration.**782

- E. L. Lohse:
**Correspondences of 8-bit and Hollerith codes for computer environments - a USASI tutorial.**783-789

- Saul Rosen:
**Letters to the editor: On selecting the sites for IFIP congresses.**801

- John Maniotes:
**Letters to the editor: on master's level curricula survery.**801

- Bernard A. Galler, Aaron Finerman:
**Lettes to the editor: Proprietary packages: a point of view.**802

- Gabor T. Herman:
**Simulation of one abstract computing machine by another.**802

- Gerard Salton:
**Editorial: professional society publications.**803-804

- Walter L. Johnson, James H. Porter, Stephanie I. Ackley, Douglas T. Ross:
**Automatic generation of efficient lexical processors using finite state techniques.**805-813

- James C. Howard, Howard Tashjian:
**An algorithm for deriving the equations of mathematical physics by symbolic manipulation.**814-818

- Richard H. Show:
**Algorithms: Algorithm 342: generator of random numbers satisfying the Poisson distribution.**819-820

- J. Grad, M. A. Brebner:
**Algorithm 343: eigenvalues and eigenvectors of a real general matrix.**820-826

- K. S. Kölbig:
**Remarks on algorithm 32: multint: certification of algorithm 32.**826

- Susumu Kuno, Anthony G. Oettinger:
**Computational linguistics in a Ph.D. computer science program.**831-836

- Ronald L. Gue, Kenneth C. Cain, John C. Liggett:
**Analysis of algorithms for the zero-one programming problem.**837-844

- Malcolm C. Harrison:
**Implementations of the SHARER2 time-sharing system.**845

- E. L. Lohse:
**Procedures for the standardization process.**846-849

- E. L. Lohse:
**Code extension procedures for information interchange.**849-852