ACM '74最新文献

筛选
英文 中文
Encapsulation: an approach to operating system security 封装:操作系统安全的一种方法
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/1408800.1408877
R. Bisbey, G. Popek
{"title":"Encapsulation: an approach to operating system security","authors":"R. Bisbey, G. Popek","doi":"10.1145/1408800.1408877","DOIUrl":"https://doi.org/10.1145/1408800.1408877","url":null,"abstract":"Currently a certifiably secure multiuser operating system does not exist; no operating system has been able to withstand mallcious attacks by skilled penetrators. While there is a strongly felt need in both the military and civilian sectors for reliably secure operating system software, any solution to the security problem must also take into account the enormous investment in existing equipment and software.\u0000 In the present paper, hypervisors are discussed as one approach to retrofitting security, but rejected due to the high cost and complexity of installing them on existing equipment. Encapsulation, an alternative solution proposed for batch and remote batch entry applications, requires only a small amount of additional hardware and verified software. The resulting system can be certified to be secure, and is thus suitable for stringent military requirements. The solution is applicable---essentially unchanged---to a wide class of hardware and software, and it is not sensitive to special versions of (or changes to) operating system code. Operating efficiency and construction costs of the encapsulation method are discussed to demonstrate its feasibility.\u0000 This work has been performed under Advanced Research Projects Agency Contract DAHC15 72 C 0308. It is part of a larger effort to provide securable operating systems in DOD environments.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A programming aid for structured programmers 结构化程序员的编程辅助工具
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/1408800.1408879
Douglas E. Jones
{"title":"A programming aid for structured programmers","authors":"Douglas E. Jones","doi":"10.1145/1408800.1408879","DOIUrl":"https://doi.org/10.1145/1408800.1408879","url":null,"abstract":"The structured programmer often produces code in an order relatively unrelated to the order required by a specific programming language. The task of reordering the structured code to the specifications of the chosen language is tedious and error prone, particularly for large programs. A programming aid, \"STRUCTURE\", is described that relieves the programmer of this burden. In addition, it provides a listing of the program in the hierarchical order of the solution, making the program more amenable to manipulation by the programmer.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121925146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modes of information presentation for the blind programmer 盲人程序员的信息呈现模式
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/1408800.1408820
M. Rahimi, J. B. Eulenberg
{"title":"Modes of information presentation for the blind programmer","authors":"M. Rahimi, J. B. Eulenberg","doi":"10.1145/1408800.1408820","DOIUrl":"https://doi.org/10.1145/1408800.1408820","url":null,"abstract":"","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact analysis 影响分析
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/800182.810419
James S. Ketchel, John P. Dolan
{"title":"Impact analysis","authors":"James S. Ketchel, John P. Dolan","doi":"10.1145/800182.810419","DOIUrl":"https://doi.org/10.1145/800182.810419","url":null,"abstract":"Impact analysis is the assessment in terms of monetary loss of any potential threat to the organization. Impact analysis combines the Bayesian decisionprocess withthe Delphi method, as modified herein. A computer can be used to produce a statistical summary useful in fore-casting.\u0000 This paper will describe impact analysis.First, brief summaries of the Bayesian decision process and the Delphi technique are offered.Then, the method for impact analysis is outlined, followed by a description of a recent application.The application was developed at the Weyer- haeuser Company, Tacoma, ashington. Weyer- haeuser is one of the largest forest products companies in the world. The paper concludes with suggestions for other applications.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Inverse compilation feasibility 逆编译可行性
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/1408800.1408927
F. Friedman
{"title":"Inverse compilation feasibility","authors":"F. Friedman","doi":"10.1145/1408800.1408927","DOIUrl":"https://doi.org/10.1145/1408800.1408927","url":null,"abstract":"The feasibility of the use of techniques of inverse compilation (decompilation) for the solution of Software Transport problems depends to a great extent upon the level of adaptability of software systems designed to automate the decompilation process. The attainment of a sufficiently high level of adaptability requires the development of very general and <u>efficient</u> techniques of program structure and variable usage analysis. However, while such techniques are necessary for the development of adaptable decompilation software, they are not by themselves sufficient. What is further needed is a highly sophisticated medium of program description that 1) is comparatively easy to map to and from assembly languages for a wide variety of machines, 2) is suitable for direct input to a program analyzer, and 3) is easily produced by a high-level language compiler.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117201544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sets and graphs in GRAAL GRAAL中的集合和图
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/800182.810415
V. Basili
{"title":"Sets and graphs in GRAAL","authors":"V. Basili","doi":"10.1145/800182.810415","DOIUrl":"https://doi.org/10.1145/800182.810415","url":null,"abstract":"This paper is an attempt at presenting a high level model of the set and graph aspects of the graph algorithmic language GRAAL [5]. The problem area for which the language GRAAL was designed was the solution of graph problems of the type primarily arising in applications. It was designed with two objectives in mind. The first was to develop a language which permitted the writing of graph algorithms in a highly readable form with as natural a set of primitives as possible for describing the algorithm. The second was to allow for a wide variety of graphs of different types and complexity with as little degradation as possible in the efficient implementation and execution of an algorithm designed for a specific type of problem.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handprint recognition on the GRAFIX I:: A commercial application of heuristic programming 手印识别在GRAFIX上的应用:启发式编程的商业应用
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/800182.810427
A. Griffith
{"title":"Handprint recognition on the GRAFIX I:: A commercial application of heuristic programming","authors":"A. Griffith","doi":"10.1145/800182.810427","DOIUrl":"https://doi.org/10.1145/800182.810427","url":null,"abstract":"This paper describes a commercial hardware/software system which reads handprinted documents. The system recognizes a full upper case alphabet, all ten digits, and several special characters, intermixed, with minimal constraints imposed on the style of printing. The recognition algorithm, which incorporates a large number of heuristic methods, is described. On a test of over sixty thousand previously unseen characters produced by untrained clerks, fewer than six percent of the characters were “rejected” as unrecognizable, and only a few tenths of a percent were misrecognized.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133215545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Artificial intelligence research in medicine 医学中的人工智能研究
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/1408800.1408903
E. Levinthal
{"title":"Artificial intelligence research in medicine","authors":"E. Levinthal","doi":"10.1145/1408800.1408903","DOIUrl":"https://doi.org/10.1145/1408800.1408903","url":null,"abstract":"Professor Edward Feigenbaum will open the panel with comments on the current status of the field. Short presentations of specific current research will be made by the panelists: (1) Professor C. Kulikowski of Rutgers describing work on a causal-associative network developed with an associated model of the therapies to serve as a basis of a consultation program in glaucoma; (2) Dr. P. P. Tsiang of University of Missouri and (3) Dr. A. Gevins, University of California Medical Center, discussing their respective papers \"Computer Analysis of Chest Radiographs\" and \"Heuristic Real Time Feature Extraction of the EEG\", abstracts of which appear elsewhere in the program booklet; (4) Dr. Bruce Buchanan, on applications of AI to structure elucidation based on gas chromatography/mass spectrometry data; (5) Dr. Edward Shortliffe, Stanford University, on an antimicrobial therapy consultation system utilizing a flexible representation of knowledge and (6) T. Rindfleisch describing SUMEX-AIM, a new nationally shared resource for application of AI to medicine.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tuning the IMS data base management system 调优IMS数据库管理系统
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/1408800.1408899
W. P. Grafton
{"title":"Tuning the IMS data base management system","authors":"W. P. Grafton","doi":"10.1145/1408800.1408899","DOIUrl":"https://doi.org/10.1145/1408800.1408899","url":null,"abstract":"For the purposes of this discussion, I would like to define \"tuning\" as the adjustment of the variables in a generalized system to optimize it for a particular environment. The generalized systems we are talking about are called Generalized Data Base Management Systems or GDBMS, and I am going to talk about one of these: IBM's Information Management System, or IMS.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130276853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A syntax-directed approach to inverse compilation 反向编译的语法导向方法
ACM '74 Pub Date : 1900-01-01 DOI: 10.1145/1408800.1408926
C. R. Hollander
{"title":"A syntax-directed approach to inverse compilation","authors":"C. R. Hollander","doi":"10.1145/1408800.1408926","DOIUrl":"https://doi.org/10.1145/1408800.1408926","url":null,"abstract":"A general syntax-directed strategy is described for translating computer programs written in a machine-level source language into equivalent programs in a higher-level target language. This translation process is referred to as decompilation or inverse compilation. Work on decompilation is potentially applicable in such areas as software portability, source-level debugging and diagnostic systems, and program analysis and validation.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"43 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130839346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信