Rosalie Steier
Pages 657-658
Bryan Kocher
Pages 660-ff.
James H. Morris
Pages 661-662
Paul Saffo
Pages 664-665
Rosalie Steier
Pages 666-671
Robert L. Ashenhurst
Pages 672-676
Last November the Internet was infected with a worm program that eventually spread to thousands of machines, disrupting normal activities and Internet connectivity for many days. The following article examines just how this worm …
E. H. Spafford
Pages 678-687
The actions taken by a group of computer scientists at MIT during the worm invasion represents a study of human response to a crisis. The authors also relate the experiences and reactions of other groups throughout the country …
Jon A. Rochlis, Mark W. Eichin
Pages 689-698
The following report has been gleaned from "A Tour of the Worm," an in-depth account of the November Internet infection. The author found the worm's crypt algorithm a frustrating, yet engaging, puzzle.
Donn Seeley
Pages 700-703
After careful examination of the evidence, the Cornell commission publishes its findings in a detailed report that sheds new light and dispels some myths about Robert T. Morris and the Internet worm.
T. Eisenberg, D. Gries, J. Hartmanis, D. Holcomb, M. S. Lynn, T. Santoro
Pages 706-709
Karen A. Frenkel
Pages 712-714
The pipeline processor is a common paradigm for very high speed computing machinery. Pipeline processors provide high speed because their separate stages can operate concurrently, much as different people on a manufacturing assembly …
I. E. Sutherland
Pages 720-738
Christopher J. Van Wyk
Pages 740-755